Slides from the RSA conference: where the world talks security
Slides of ESET presentations at RSA are now available including the SMB Cyber Security Survival Guide and "What THEY want with your digital devices."
Slides of ESET presentations at RSA are now available including the SMB Cyber Security Survival Guide and "What THEY want with your digital devices."
An invite to a conference in California proves to be a scam, and a very similar spam claims the very same conference is taking place in New York in March.
Analysis of malicious code dubbed Win32/Caphaw (a.k.a. Shylock) attacking major European banks, with ability to automatically steal money when the user is actively accessing his banking account.
NBC.com may have sent visitors to infected URLs serving up Trojan software (RedKit) for 24 hours. At the time of this blog post ESET researchers still see some related sites similarly compromised.
Technical analysis of malware that abuses code signing certificates normally used to positively identify a software publisher and to guarantee code is unchanged.
Correct identification of an individual using a computer or service is important because it represents the accountability of the person identified. If you know my username on a computer system, you can check on what I do on that system through an audit trail, and I can therefore be held accountable for those actions. However,
The Financial Times reported that the UK and India will improve co-operation in a bid to combat the growing threat from international cyber crime and cyber warfare in a new agreement between the two countries. The announcement was made during British Premier David Cameron’s trade trip to the emerging economic power.
The hottest IT trend in the workplace right now is definitely BYOD: Bring Your Own Device. This is popular with employees who regard it as a convenient way to read private e-mail and to browse to (work-unrelated) sites at the office, and moreover as a way to work for their employer on a device they
Valentine’s Day is fast approaching and romance is in the air. Love is also blooming online, but sadly, so are romance scams. We have covered romantically-themed online scams in the past. These include attempts to spread malware through Valentine-themed links on social media, search engine poisoning, phony gift cards, and fake e-greeting cards. Today we
According to the EU’s law enforcement agency Europol a complex ransomware network has been shut down. The operation to close the network was headed by Spanish police in cooperation with the agency. Eleven people have been arrested from Russia, Georgia and Ukraine. The scheme planted malware on computers which accused the users of viewing illegal
Could distributed denial of service (DDoS) malware be evolving to defeat anti-DDoS security measures like CloudFlare? We do not usually see a lot of innovative denial-of-service malware in our day-to-day work. What we do see usually boils down to the basic flooding techniques: TCP Syn, UDP and ping floods, and sometimes HTTP-oriented floods. Of course,
U.S. President Barack Obama plans to release a long-awaited executive order aimed at improving cyber security were realised Tuesday. The order is designed to better protect the country's critical infrastructure from cyber attacks that are a growing concern to the economy and national security, according to Reuters.
The United States Attorney for the Southern District of New York filed an indictment against two defendants allegedly involved in an ATM skimming operation that resulted in the loss of over $3 million from 6000 bank accounts.
ESET Ireland's Urban Schrott has blogged recently that "Research reveals nearly half of all Irish computers depend on free antivirus for protection".
In a world where nothing seems to be constant but change, it's good to know that there are, in fact, some things that change fairly slowly. Unfortunately, readiness to believe and spread hoaxes is one of them.
According the UK’s National Audit Office (NAO) the Cyber Strategy outlined in November 2011 has started to deliver benefits but more must be done. According to the NAO the cost of cyber crime to the UK is estimated to be between £18 billion and £27 billion. Business, government and the public must therefore be constantly
Several email accounts belonging to family members of former President George W. Bush were hacked and the contents made public, exposing private data, correspondence and personal photos, according to The Smoking Gun. The apparent hack affected email threads between several members of the Bush family, including both former U.S. Presidents. According to the report, the
British defence company BAE Detica is predicting a “gearing up” of cyber attack capabilities across an increasing number of nation states in 2013.
According to the PwC Top Health industry issues of 2013 report, healthcare managers and consumers are increasingly concerned about the rise of healthcare workers using their own devices within hospitals and other healthcare centers.
ESET’s threat researchers received a surprise earlier this week when they began receiving reports from ESET LiveGrid that downloads of ComboFix, a tool popular with advanced users for removing malware, were detected as being infected by a variant of the Sality virus, Win32/Sality.NBA.