archives

June 2016

Mark Zuckerberg’s social media accounts accessed

Mark Zuckerberg’s social media accounts have been accessed without his permission or knowledge, it has been revealed.

Infrastructure attacks: The next generation

ESET’s David Harley revisits the Stuxnet phenomenon: How has the way we see the malware and its impact changed?

The security review: Crouching Tiger, Hidden DNS

Welcome to this week’s security review, including the story of a DNS hijack that sets the victim’s computer to use specific DNS servers.

How to delete your smartphone data securely before selling your device

Understanding how to delete your smartphone data before selling your device is important if you want to protect your privacy and keep information secure.

Nearly all phishing emails now contain ransomware

As many as 93% of all phishing emails now contain ransomware, according to a new report by PhishMe.

Beware online fraudsters jumping on the back of recent data breaches

The Internet Crime Complaint Center (IC3) has issued a public service announcement warning people about online fraudsters, who are attempting to exploit a recent spate of data breaches that have only just come to light.

Crouching Tiger, Hidden DNS

An interesting DNS hijack that sets the victim’s computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat.

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.

Myspace data breach: 360 million accounts affected

Myspace has revealed that it was the victim of a data breach. The incident took place a few years ago and is thought to have affected close to 360 million accounts.

Children’s Day advice: The risks looming in cyberspace

For many parents, especially those who aren’t digital natives, recognizing risks that loom in cyberspace is not easy. This guide helps point to some of the main threats.

Follow us

Copyright © 2018 ESET, All Rights Reserved.