In Part 1, our roundup of some of the most notable law enforcement actions against computer crime in the first quarter of 2018 will focus on arrests and charges involving suspected cyber-crooks.
Archives - April 2018
Criminals have devised a new scheme that aims to drain the bank accounts of large corporations.
Hackers have managed to deface an array of popular YouTube music videos, changing titles and thumbnail images.
WeLiveSecurity sat down with Tony Anscombe, Global Security Evangelist and Industry Ambassador for ESET, to talk about RSA 2018, his talk at the conference, and what to expect.
The 2016 compromise of the league’s Twitter account is one of a number of high-profile social media hijackings.
Most of the White House's email domains have yet to deploy an email authentication protocol known as DMARC that is designed to reduce the risk of attackers impersonating legitimate email addresses for distributing spam or phishing messages.
Cybercriminals are believed to have stolen information for more than five million credit and debit cards that shoppers had used at dozens of Saks Fifth Avenue, Saks Off 5th and Lord & Taylor stores mainly in the United States between May 2017 and March 2018.
ESET researchers have analyzed a newly discovered set of apps on Google Play, Google's official Android app store, that pose as security applications. Instead of security, all they provide is unwanted ads and ineffective pseudo-security.
The tech giant is taking the measure after a rise in malicious browser extensions that mine digital money by hijacking the processing power of users' computers. The clampdown follows Google’s recent move to stop serving any and all adverts promoting virtual currencies and initial coin offerings.
Implementing the five actions described in this article can help reduce your organization's cyber risk and bolster its security defenses
The Lazarus Group gained notoriety especially after cyber-sabotage against Sony Pictures Entertainment in 2014. Fast forward to late 2017 and the group continues to deploy its malicious tools, including disk-wiping malware known as KillDisk, to attack a number of targets.