ESET Research | WeLiveSecurity

Bio

ESET Research

ESET Research

Articles by author

More statistics on infections

Last year (http://www.eset.com/threat-center/blog/2009/09/03/more-infections-a-lot-more-malware), we posted statistics collected through our online scanner logs.  Below, you will find updated statistics on the number of infected  hosts, malicious files and malware families found on infected systems. In general, the statistics we are seeing in through our online scanner logs are consistent with our observation from last September.  We

Buzz, Privacy, Google, and You

A couple of weeks ago Google added Buzz to Gmail and in doing so exposed the contacts of many users without their knowledge. This created quite a stir and Google had to make some changes fairly quickly. I am quite interested in the thoughts of people concerning how Google launched Buzz and if it changed

Come See Us at RSA

If you’re going to be attending RSA in San Francisco next week, stop by our booth (#1751) and say hi! ESET bloggers Jeff Debrosse, David Harley, and I will be there.  Jeff and I will take turns presenting “Security’s Rosetta Stone: Translating security to human behavior”. You can also enter a drawing to win some

Too Many Chiefs and not Enough Indians

Ahhh that was a coworker’s favorite saying each time administrators would make idiotic decisions because they weren’t in the trenches to see the effects of their decisions. There is a result from the National Cyber Security Alliance survey that I find specifically interesting. First, let me preface this by saying the thing you learn most

Cyber‑Education

The NCSA (National Cyber Security Alliance) just released the detail of a survey of educators and technologists concerning both cybersecurity and cyberethics education in the schools. Cyberethics is prevention. It attempts to decrease cybercrime by teaching that it really is still crime and not very nice.  Cybersecurity is teaching defense. If I covered the whole

Does Anyone Know WHOIS Out There?

A report was recently released which examined the accuracy of the information within the WHOIS system. WHOIS services are intended to provide free public access to information about the registrants of Internet domain names. This report was commissioned by ICANN, the body that oversees the allocation & registration of Internet domain names. Probably the most

Avoiding Conflict

Some of you may be aware that some users have recently encountered problems with one of Microsoft's security updates. Some user's systems would crash with a "Blue Screen Of Death" (BSOD) after installing Microsoft's latest batch of security updates. The problem has been narrowed down to the MS10-015 update. It seems that systems that have

The Google End Game

I came across an interesting side effect of Google forcing Gmail to be a social networking site. A young lady in middle school replied to a Buzz about what you think about Buzz. Her response? “I am just getting the hang of Buzz right now too. I don't really go on blogging websites since my

Class Action Lawsuit Filed Against Google for Buzz

http://www.computerworld.com/s/article/9158858/Google_slapped_with_class_action_lawsuit_over_Buzz?taxonomyId=84 This is not a surprise. Google made an egregious privacy error when they published people’s private contacts without consent.  In a recent blog entry at the official Gmail blog http://gmailblog.blogspot.com/, Google claims to have rolled out the improvements they had promised. The feedback is that the improvements are not working and Google continues to

A Bit More on PleaseRobMe

Yesterday I recorded a podcast for The Malware Report with guest Ira Victor of Data Clone Labs Inc. Ira also co-hosts the radio show “The Cyber Jungle” which you can find at www.thecyberjungle.com. The podcast should be up in the next week or so. During the show Ira mentioned the website http://www.PleaseRobMe.com. This site takes

Operation Cyber ShockWave

While serving in the Marine Corps, one activity that I felt was effective in preparing both myself and my unit to be able to handle real-world scenarios, was getting as much experience as possible from military training exercises. In most cases multiple branches worked together or, as in the case with NATO exercises, multiple countries

The iPhone Survey Final Results

The Survey is closed and I had a whopping 28 total responses :) The questions were 1. How often do you connect your iPhone to a computer with iTunes running? 2. Have you owned your iPhone for at least 6 months? 3. How did you learn of this survey? Five people did not respond to

Google the Buzz Bomber

Here’s an update on “Is Gmail Spyware” http://www.eset.com/threat-center/blog/2010/02/12/is-gmail-spyware First of all a link I gave to a blog no longer works. The Blogger has restricted access to her blog, understandably. You can read the original blog post at http://gizmodo.com/5470696/fck-you-google. Google is supposed to be the “Do no evil” company. Actually those aren’t Google’s words, you

Worth Reading

Google's lack of responsiveness on their own supoprt forums is telling. http://www.google.com/support/forum/p/gmail/thread?tid=6a1537053d29da99&hl=en Google has changed their mantra to "do nothing that isn't evil." I think the NSA wants to learn from Google, not the other way around :) Randy Abrams Director of Technical Education

Is Gmail Spyware?

Perhaps you have seen the recent buzz around Google Buzz. The fact is that Google has decided that anything it knows about you it is free to share with the world at its discretion and not only do you not need to be told, but if you say no they will say yes for you.

The iPhone Survey

I recently blogged about Patching an iPhone. I’m not sure if I’ll get anymore takers for the survey at http://www.surveymonkey.com/s/V76LK5L, but if I do I’ll update the results. With 24 responses in, here is what I found. 15 (62.5%) users reported connecting their iPhones to a computer running iTunes at least once a week. Of

Are You As Smart As Your Phone?

According to Cell-news.com, in 2007 over 850,000 Brits flushed their cell phones down the toilet. I’m sorry to report that there isn’t much a security vendor can do to help you if you flush your cell phone. ESET recently commissioned a study of smart phone users concerning mobile security. The results are interesting. A little

Google’s Stance on Privacy

Recently Eric Schmidt, the CEO of Google, said in an interview “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place”. There are a variety of circumstances in which a person would want some degree of privacy for perfectly legitimate reasons. If a person

Patching an iPhone

Apple recently released a patch for the iPhone operating system. The fixes some pretty serious vulnerabilities, but… you must connect your iPhone to a computer and run iTunes to update the iPhone. This led me to start wondering how many iPhone users rarely connect their iPhones to a computer? I suspect there are quite a