Congresswoman Katherine Clark targets online abuse with new bill

United States Representative Katherine Clark is hoping to provide more support for victims of online abuse with a new bill offering resources and education.

Vulnerability in common hotel routers threatens guest devices

A vulnerability in the Wi-Fi routers used in hundreds of hotels across the world has been uncovered by security researchers, Wired reports.

National Power Grid suffers frequent cyberattacks, says report

The US national power grid is subject to physical or online attacks around once every four days, a report by USA Today reveals.

Ships at risk of hacking, says report

A report suggests that while the number of ships lost at sea is decreasing, cyberthreats are becoming a more pressing issue for the maritime industry.

Hacker threatens cyberattacks against Detroit over court decision

A hacker going by the name of ‘Bitcoin Baron’ has issued a threat to the city of Detroit after a Wayne County Circuit Court Judge dismissed a police manslaughter charge.

Google’s Project Zero reveals possible memory leak hack

Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP

A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.

Linux haunted by Ghost vulnerability

Security researchers have found a vulnerability inherent to a widely used component in most versions of Linux, reports Computer World.

Corel vulnerabilities could allow hackers in via DLL hijacking

Many of Corel’s photo, video and media editing programs contain DLL hijacking vulnerabilities, a security researcher has discovered.

Healthcare security needs investment to stave off cyberattacks, says report

A new report from IDC Health Insights claims that healthcare firms need to invest to ensure protections from cyberattacks, according to the Computing website.

Insider threat – should you worry about the ‘enemy within’?

Disgruntled employees and other malicious insiders could be one of the most serious security threats companies face – but the importance of the threat from the ‘enemy within’ varies according to who you ask.

Adobe and Microsoft release critical patches for March

Adobe and Microsoft have both released patches this week to address vulnerabilities in respective software applications and advise all users to apply the patches as soon as possible, if applicable to them.

Slides from the RSA conference: where the world talks security

Slides of ESET presentations at RSA are now available including the SMB Cyber Security Survival Guide and “What THEY want with your digital devices.”

Europol shuts down global ransomware network

According to the EU’s law enforcement agency Europol a complex ransomware network has been shut down. The operation to close the network was headed by Spanish police in cooperation with the agency. Eleven people have been arrested from Russia, Georgia and Ukraine. The scheme planted malware on computers which accused the users of viewing illegal

How Do You Find 200,000 Unique Samples a Day?

I recently received a couple of questions about signatures from a reader. 1- You said that ESET receives around 200000 unique malware samples daily, so does ESET detect most of them or detect only the malwares that their signatures are listed here: http://www.eset.com/threat-center/threatsense-updates ? 2- Nowadays why signatures are written? Are they written to detect

Follow us

Copyright © 2015 ESET, All Rights Reserved.