In August 2018, Sednit’s operators deployed two new Zebrocy components, and since then we have seen an uptick in Zebrocy deployments, with targets in Central Asia, as well as countries in Central and Eastern Europe, notably embassies, ministries of foreign affairs, and diplomats
Search results for: "ssn"
Girls Inc. of San Diego County was founded 50 years ago as a local affiliate of the national Girls Inc. The national organization was started as the Girls Club of America more than 150 years ago, to help young women who had migrated from rural communities in search of job opportunities.
In journalism, having good contacts is key and this is true when it comes to defending your digital assets. The following are some sources – of information and, possibly, assistance – that you might want to cultivate.
Using smartphones at a bank might seem like the most routine habit in the world but sometimes these smartphones are being used as way to gain access to the bank's WiFi and sensitive data.
Sednit is back - this time with two more zero-day exploits embedded in a phishing email titled Trump's_Attack_on_Syria_English.docx.
Tax identity fraud is a multibillion dollar industry for criminals. ESET's Lysa Myers explores new measures and offers some top tips on how to tackle this menace.
How do you calculate the value at risk? Choosing between investing in antivirus software or doing nothing to prevent cybercrime is not black and white. We explore the grey areas of cybersecurity economics.
Get Safe Online has issued a warning to consumers to be aware of banking scammers, as cybercriminals are finding more sophisticated ways to access their account details.
As Tax Identity Theft Awareness Week in the US gets underway, ESET's Stephen Cobb offers expert advice on how to protect yourself from fraudsters.
Ahead of next week's Virus Bulletin conference, ESET's Lysa Myers offers a teaser of what to expect of her "small talk" with colleague Stephen Cobb.
How much of people's willingness to ignore security warnings is down to their brains?
The reformed conman that the 2002 film 'Catch Me If You Can' is based on has told The Times that anyone living in the US or UK has already had their identity stolen.
Information security has become an even more critical factor of the business model, as it protects the most essential asset: information.
Possible 2016 Republican presidential candidate Jeb Bush has has had to retroactively redact over 12,000 personal details from emails published in the name of transparency
Yesterday the Anthem breach, the biggest healthcare-related breach to date was announced, as attackers accessed a database containing the records of current and former employees. As we discussed earlier this morning on We Live Security, this could affect as many as 80 million people.
Tax Identity Theft Awareness Week? Yes, tax ID fraud is a real threat to your finances in America today. Putting your tax refund in jeopardy is just one of the impacts.
The fallout from Sony Pictures' hacking continued today, with the Wall Street Journal reporting that 47,000 sets of personal details have been posted online.
In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
Your home may be your castle, but on social networks, your friends are your perimeter. Will they enclose and protect your personal data?
When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.