Up close with the Evilnum group and its eponymous malware – A severe flaw in networking gear – Router firmware under the microscope
A study paints a dim picture of router security, as none of the 127 devices tested was free of severe vulnerabilities
While logins to music and video streaming services sell for less than ten dollars each, domain admin access is being offered for US$120,000
ESET research gives a detailed picture of the operations of the Evilnum group and its toolkit deployed in attacks against carefully chosen targets in the fintech sector
The vulnerability, which received the highest possible severity score, leaves thousands of devices at risk of being taken over by remote attackers. A patch is available.
How (over)sharing your children’s triumphs and antics with the world may impact their immediate and distant future – and how to reduce the risks of ‘sharenting’
The Federal Reserve looks at ways to counter what is thought to be the fastest-growing type of financial crime in the United States
Brute-force attacks against RDP surge – Is contact tracing the answer to ending the COVID-19 crisis? – Microsoft ships urgent security updates
European police infiltrate EncroChat, go on to crack down on crime kingpins and seize guns, drugs, cars and millions in cash
The cybercriminal behind the ransom raids on almost 23,000 databases threatens to leak the data and alert GDPR regulators
The out-of-band update plugs two remote code execution bugs in the Windows Codecs library, including one rated as critical
Can a technological intervention stem the pandemic while avoiding the privacy pitfalls of location tracking?
Poorly secured remote access attracts mostly ransomware gangs, but can provide access to coin miners and backdoors too
Android ransomware posing as a COVID-19 tracing app – Ill-trained and ill-equipped newly-minted remote workers – How Bitcoin giveaway scams misuse Elon Musk's name
A password manager can make your digital life both simpler and more secure. Are there any downsides to relying on software to create and store your passwords?
In a move lauded by privacy advocates, Boston joins the ranks of cities that have voted down the municipal use of the technology
ESET researchers dissect an Android app that masquerades as an official COVID-19 contact-tracing app and encrypts files on the victim's device
And many of them didn’t receive any new security training or tools from their employer to properly secure the devices, a study finds
The giveaway scheme uses the tech titan’s name as part of Bitcoin addresses for extra credibility
ESET research into Operation In(ter)ception and InvisiMole's latest shenanigans – Security flaws in countless IoT devices