
Latest Articles
RSA 2018: IoT security comes of age
IoT security may have finally turned the corner towards a more secure future.
What’s the deal with session-replay scripts?
Some aspects of online tracking go beyond just website analytics
RSA 2018: Hacking the grid
The challenges facing critical infrastructure systems
Rough patch, or how to shut the window of (unpatched) opportunity
Simply throwing more staff at the patching problem won’t cut it, a study suggests.
RSA 2018: Untangling the enterprise security mess
Securely keeping track of data and security applications
Trends 2018: Democracy hack
Can the electoral processes be protected?
Fake or not fake – that is the question
An interview with ESET’s Lukáš Štefanko on the thin line between what deserves the name “security app” and what can be called fake.
Quarterly cybercrime digest: Extraditions and more
As Internet crime knows no borders, mutual legal assistance involving various nations and, by extension, requests for extraditing suspected cyber-offenders are sometimes part and parcel of prosecution efforts.
Quarterly cybercrime digest: Sentencing
The long arm of the law caught up with a number of cybercriminals in the first three months of this year.
This ransomware wants you to play, not pay
An unusual ransomware request has been uncovered by researchers.
Anti-Malware testing needs standards, and testers need to adopt them
A closer look at Anti-Malware tests and the sometimes unreliable nature of the process.
Quarterly cybercrime digest: Arresting and charging
In Part 1, our roundup of some of the most notable law enforcement actions against computer crime in the first quarter of 2018 will focus on arrests and charges involving suspected cyber-crooks.
Fraudsters intercept corporate debit cards and swap out chips in new scam
Criminals have devised a new scheme that aims to drain the bank accounts of large corporations.
The world’s most popular YouTube video has been hacked
Hackers have managed to deface an array of popular YouTube music videos, changing titles and thumbnail images.
Looking ahead to RSA 2018: An interview with ESET Security Evangelist Tony Anscombe
WeLiveSecurity sat down with Tony Anscombe, Global Security Evangelist and Industry Ambassador for ESET, to talk about RSA 2018, his talk at the conference, and what to expect.
Hacker who broke into NFL’s Twitter account to spread death hoax learns his punishment
The 2016 compromise of the league’s Twitter account is one of a number of high-profile social media hijackings.
Study: White House email domains at risk of being misused for phishing scams
Most of the White House's email domains have yet to deploy an email authentication protocol known as DMARC that is designed to reduce the risk of attackers impersonating legitimate email addresses for distributing spam or phishing messages.
Saks and Lord & Taylor stores suffer data breach exposing five million bank cards
Cybercriminals are believed to have stolen information for more than five million credit and debit cards that shoppers had used at dozens of Saks Fifth Avenue, Saks Off 5th and Lord & Taylor stores mainly in the United States between May 2017 and March 2018.
Beware ad slingers thinly disguised as security apps
ESET researchers have analyzed a newly discovered set of apps on Google Play, Google's official Android app store, that pose as security applications. Instead of security, all they provide is unwanted ads and ineffective pseudo-security.
Google banishes cryptocurrency mining extensions from Chrome Web Store
The tech giant is taking the measure after a rise in malicious browser extensions that mine digital money by hijacking the processing power of users' computers. The clampdown follows Google’s recent move to stop serving any and all adverts promoting virtual currencies and initial coin offerings.