archives

January 2018

Google smashed over 700,000 bad Android apps last year

Google says that it is getting better than ever at protecting Android users against bad apps and malicious developers.

Privacy of fitness tracking apps in the spotlight after soldiers’ exercise routes shared online

People exercising on far-flung military bases are being exposed by their fitness tracker.

Babies’ personal data hawked on dark web

The price puts the data records at a significant premium when compared to other stolen datasets. While, in general, many adverts in the dark recesses of the internet are fake, children’s personally identifiable information (PII) has for long been viewed as a particularly valuable commodity.

FriedEx: BitPaymer ransomware the work of Dridex authors

ESET research has found that the ransomware FriedEx, also known as BitPaymer, is actually the work of the notorious gang responsible for the Dridex banking trojan.

Jail for man who hacked 1000 student email accounts in search for sexually explicit images

A poorly-secured password reset utility allowed a man to access more than 1,000 email accounts at a New York City-area university in a hunt for sexually explicit photographs and videos.

How well can bug hunting pay?

In some countries, the financial allure of looking for security vulnerabilities is (even) more striking, according to the findings of a survey released recently by bug bounty platform provider HackerOne.

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

Data privacy is also a topic that can spark big debates, like the one between the US and the EU as to what protections should be accorded to data pertaining to people, specifically by those who collect, control, or process such data.

10 Linux distributions recommended for 2018

The new features included all the patches, fixes, and updates to the tools and Kernel that were released over the preceding period, which is no small matter, especially if you use Maltego or SET.

ESET’s guide makes it possible to peek into FinFisher

To help malware analysts and security researchers overcome FinFisher’s advanced anti-disassembly obfuscation and virtualization features, ESET researchers have framed some clever tricks into a whitepaper, “ESET’s guide to deobfuscating and devirtualizing FinFisher”.

South Korea moves to ban anonymous cryptocurrency trading

As part of the policy, underage individuals and foreigners without local bank accounts will be barred from trading in virtual currencies. Banks will be required to share information about cryptocurrency exchanges with each other.

Five ways to check if your router is configured securely

In a dynamic environment where threats continually evolve and new vulnerabilities are identified almost daily, it is necessary to use the most up-to-date security tools, since they deal with protection measures for new and ever-shifting attack vectors.

Up to 40,000 OnePlus customers potentially hit by credit card hack

The breach put at risk ‘only’ the customers who entered their payment data on oneplus.net between the middle of November 2017 and January 11, 2018. Those who paid with previously saved credit card details or via PayPal are believed to be out of harm’s way.

World Economic Forum: Cyberthreats rising in prominence in global risk landscape

The latest survey marks a shift from optimism regarding technological risks in the previous years. The heightened levels of worry come on the back of an escalation in cybersecurity threats, which, as noted by the WEF, are growing in prevalence and in disruptive potential alike.

Are mobile devices insecure by nature?

Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.

CES 2018 cybersecurity: Now in every single ‘whatchamacallit’

Not content anymore to just have a bed made of soft plushy stuff, now you can adjust everything about the bed, from electronically sitting up in bed to the lighting surrounding your nap: connected digital technology everywhere.

Trends 2018: Personal data in the new age of technology and legislation

The depth of data collected from our online habits could easily allow profiles to be constructed, showing what may be considered extremely personal interests, drawing on information that we don’t realize someone is collecting.

Carphone Warehouse faces hefty fine for 2015 breach

The attackers gained access to a range of customer data such as names, addresses, phone numbers, dates of birth, and marital status. Making matters worse, the historical payment card details of some 18,000 customers were also compromised.

CES 2018: Blockchain will solve everything

The first obvious candidate was banking, a sector that has been hard at work trying to implement blockchain to secure the vast troves of digital transactions that happen every microsecond of every day.

Scammers and jobhunters

It’s easier to have scruples about how you earn your living when you’re not one of millions of people chasing just a few thousand jobs.

CES 2018: Why doesn’t everyone use VR already?

One side effect of slower than expected uptake of VR is that virtual reality application developers have been slow to invest in creating content. In this sort of chicken-and-egg cycle, growth tends to be slow, not explosive.

Follow us

Copyright © 2018 ESET, All Rights Reserved.