Corvette hacked with a text message

Researchers have hacked into a Corvette with a simple text message, taking control over its brakes.

Bug causes iPhones to crash when sent malicious text message

An exploit has been discovered that causes iPhones and iPads to reboot when sent a string of malicious text.

Securing Your Holiday Tech Gifts, Part 2: Android Guide

The Android ecosystem has taken the market by storm in the last few years, with hundreds of millions of devices, smartphones and tablets, already in the hands of customers, and more on the way this holiday season. As you will know if you read our recent blog post about malware trends in 2013, malicious code

Back to school scams? They may be just around the corner

Just as I was putting the finishing touches on a blog post about the need to keep your data and devices safe on summer travels, I got an email from Apple letting me know that now was a great time to buy a Mac for college. I don't plan to go back to college at

SMSmishing (SMS Text Phishing) – how to spot and avoid scams

If the smartphones of ESET bloggers are any indication, scams executed via SMS text, known as smishing or SMS phishing, are on the rise. I don’t do a lot of texting, which makes a smish easy to spot on my phone, but I just read an amazing statistic from a Pew report: Users 18 to

Hexzone Hotzone

Some more information on the Hexzone botnet has come my way, mostly from FireEye’s Atif Mushtaq and Paul Ferguson’s hairdresser (don’t ask!). Atif also mentions the association with ransomware: the malware is installed as a Browser Helper Object (BHO) on the victim’s machine, and hijacks browsing sessions, taking the victim to a page hosting pornography.

Anti-Antimalware: Faking It, Not Really Making It

Update: a quick tip of the hat to Steven, who sent us a URL for a somewhat related blog about problematic premium text services. Speaking of the 2008 report, here’s another extract, this time about fake antimalware. "We expect to see increasing volume and sophistication in criminal attempts to extort money from end users in

Follow us

Copyright © 2015 ESET, All Rights Reserved.