I want share with you what ESET Latin America’s Research team thinks will be the main trends in malware and cybercrime in 2012. In our office it is usual to produce an analysis of emerging trends in a year-end report and so, in keeping with recent postings by my ESET colleagues, I present a summary
Search results for: "2012 predictions"
To round out our series of malware and cybercrime predictions here are some of my thoughts on what the next 12 months will bring. I expect more high profile arrests of cyber-criminals but no abatement in criminal activity that seeks to profit at the expense of data owners. Some of these arrests will occur in
In 2011 we saw an increase concern about, and scrutiny of, what exactly social networking sites do with the data you input, both internally as well as what gets shared with third parties. But in 2012 some of that scrutiny will shift to those third parties as more people ask: What are they doing with
Java will consolidate its position as the successor to PDF and SWF in the favourite exploits stakes.
Exactly how people will abuse digital technology for their own ends is difficult to predict, but organizations must plan ahead to protect data and systems. That's why we have been posting our "best guess" cybersecurity predictions on the Threat Blog this month. Today we present 9 of the most important predictions in the form of
While I share the reluctance of my colleagues to predict the future, I think there are some trends that can be classified as “reasonably likely to occur” in 2012. I make no promises, but here’s what I think we will see, in no particular order of importance or certainty. We will see increased interest in
As regular readers will know, every year we publish our predictions on cybercrime attacks for the year ahead. Well, our South American research team has spent the last few weeks putting together our predictions for 2015.
ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi‑tech malware
The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.
Apparently we posted 235 blogs here in 2012, just a fraction under 20 blogs per month on average. So this would be a perfect moment to produce one of those summaries of the year’s activities that wordpress.com provides, telling you how many people viewed your blog site and how many times they’d go round the
Many of you have read the last few weeks that we published posts on trends for 2012 in the field of malware and cybercrime. In this series I wrote a post based on the document that the Education and Research team of ESET Latin America put together, entitled “2012 Predictions: More mobile malware and localized
What kind of malware and cybercrime can we expect in 2012? How much of it can we expect and what should we do about it? So begins that special season, the one in which experts of every stripe are called upon to prognosticate about the coming year. In keeping with the spirit of this particular
A look back at how ransomware – a type of malware used mostly for hijacking user data – has evolved from the days of PC Cyborg to today's service for sale.
Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German security researchers.
When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.
No one is too surprised to meet robots on the International Space Station - its Robonaut has posed for dozens of photos with astronauts - but a floating ball with an Android smartphone and multiple cameras aboard may turn heads.
Blackshades is a RAT and the FBI has just arrested a lot of people involved in its use and distribution. But what's a RAT and how will these arrests impact cyber crime?
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 - so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google's OS...
This holiday season, shoppers are turning to mobile as a new way to hunt bargains, with purchases via mobile platforms nearly doubling year-on-year - but nearly one third of shoppers polled admitted to serious security errors, such as storing card details in smartphones.
Companies have “heads in sand” about security threat as employees sneak mobile devices to work, report warns
Employers are failing to face up to the threats posed by employees who use their own mobile devices at work - 40% of companies do not consider the 'bring your own device' (BYOD) trend even to be on their agenda, according to a survey of IT workers.