search result

Which Army Attacked the Power Grids?

The hot news http://blog.eset.com/2010/07/17/windows-shellshocked-or-why-win32stuxnet-sux is of a zero-day vulnerability that has been used to attack SCADA systems. This comes hot on the heels of an article on the Wired web site titled “Hacking the Electric Grid – You and What Army” http://www.wired.com/dangerroom/2010/07/hacking-the-electric-grid-you-and-what-army/. So clearly Wired had already predicted the origins, at least vaguely, of Win32/Stuxnet.

Extended Validation SSL

  We received and interesting comment in reply to the blog post http://www.eset.com/threat-center/blog/2009/10/13/phishing-the-fbi-and-terror. Joseph A’Deo, who apparently works for Verisign, mentioned the use of extended validation SSL (EV SSL). I am sure that some of you are familiar with EV SSL. Some of you have seen the results of it and perhaps not noticed. Some

16 years of Mac OS X: Secure but not invincible to malware

Mac OS X is still secure 16 years after its creation, but increasingly being targeted by cybercriminals. No operating system is 100% malware-proof.

PayPal users targeted in sophisticated new phishing campaign

Recent phishing scams targeted both Gmail and Yahoo, and now attackers have their sights set on PayPal with some very convincing bait.

IoT attacks: 10 things you need to know

IoT attacks are on the rise. As the technology becomes more relevant to our lives, we take a look at what the state of play is.

OSX/Keydnap spreads via signed Transmission application

During the last hours, OSX/Keydnap was distributed on a trusted website, which turned out to be “something else”. It spread via a recompiled version of the otherwise legitimate open source BitTorrent client application Transmission and distributed on their official website.

2016 Rio Olympic Games: The safe way to obtain tickets online

Don’t get fooled by criminals before the 2016 Olympic Games in Rio, says ESET’s Ondrej Kubovič. These sporting events are a prime target for fraudsters.

Infrastructure attacks: The next generation

ESET’s David Harley revisits the Stuxnet phenomenon: How has the way we see the malware and its impact changed?

Buying Ray-Bans? Don’t fall for this Facebook scam

Recently, we’ve observed a new wave of scams on Facebook. Crooks are luring social network users to visit bogus Ray-Ban e-shops and buy heavily discounted sunglasses there. Victims’ payment card details are at risk.

One-third of HTTPS websites left vulnerable to DROWN attack

A new vulnerability could leave as many as one-third of HTTPS websites open to decryption.

iOS AirDrop vulnerability allows for malware installation on Apple devices

A security expert has found a vulnerability on iOS devices that allows malware to be installed via AirDrop.

10 steps to staying secure on public Wi-Fi

The convenience of public Wi-Fi for many people is invaluable, yet there are risks. With all this in mind, here are 10 tips to staying safe.

How to shop online safely during the summer sales

The summer sales are upon us and there are plenty of good deals to be had online, but internet shopping is not without its dangers.

Dissecting Linux/Moose: a Linux Router-based Worm Hungry for Social Networks

A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.

No iOS Zone, the vulnerability that enables DoS attacks on Apple devices

Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.

1,500 iOS apps open to simple man-in-the-middle attacks

Around 1,500 apps for iPhone and iPad contain an HTTPS vulnerability making it ‘trivial’ for hackers to perform man-in-the-middle attacks to steal passwords, bank details and other private information.

Lenovo and Superfish? Don’t panic, you may not be affected

Lenovo’s installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

iCloud users in China under attack. But who could be after their passwords?

Make sure you are running a half-decent browser, don’t ignore browser security warnings, and enable two-factor authentication.

That appears to be the lesson to learn from the latest attack on Chinese internet users.

Gamescom 2014: World of Malware?

The gaming industry keeps growing, and the crowds at Cologne’s Gamescom 2014, show why big game titles are rapidly becoming a target for cybercrime. Our tips will help you enjoy the latest games – without hackers declaring ‘Game Over’.

Heartbleed bug: worse than feared and could affect “billions”

The full scope of the Heartbleed bug came to light in a series of reports by researchers and white-hat hackers, with some claiming a billion smartphones may be at risk, as well as a statement allegedly from the US government over its use of the bug.

Copyright © 2017 ESET, All Rights Reserved.