Players of the hit game have been targeted with a Trojan disguised as a semi-official add-on client for the game, made by Curse - but it is fake, laced with a Trojan which steals passwords, account emails and authenticator information at once, Blizzard said.
Could new malware steal data from INSIDE your SD card? Researchers claim even solid‑state PC drives could be at risk
Two researchers have demonstrated an attack that could alter and steal data direct from MicroSD cards, using tiny microcontrollers on the cards themselves. The attack could be used to copy or steal data - and even modify sensitive data such as encryption keys.
The ‘Digital Guardian’: IBM’s security expert explains why ‘Steve’ might watch your eating habits to keep you secure
Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction - but very close to reality.
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR conference in Chennai, which was kindly presented by ESET’s Chief Research Officer Juraj Malcho, as neither Larry nor myself were able to attend the conference in the end. The paper is also available
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers - 75% of detections come from this region.
ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi‑tech malware
The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.
A Firefox add-on has turned 12,500 users of the browser into a botnet which scours every page visited by infected users for vulnerabilities. The ‘Advanced Power’ add-on ensnared 12,500 PCs - and found 1,800 vulnerable websites for its unknown creators.
The assault by cybercriminals against big businesses continued this year -78% were attacked by outsiders, according to a report by Price Waterhouse Cooper. But small businesses - those with less than 50 employees - are rapidly becoming a target.
An international plot which would have turned huge numbers of PCs into “bricks” by using deeply buried malware was foiled by the NSA, according to an interview given to CBS by NSA director Keith Alexander. The attack could have "taken down the U.S. economy", an NSA official claimed.
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting businesses big and small.
All of Android’s top 100 apps have been hacked – and banking apps are now a prime target, report finds
All of the top 100 apps on Google's Play store have been hacked, and hackers now specifically target financial apps, such as those used by banks - with 53% of Android banking apps having been cracked, according to a report by Arxan.
In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still active – November has been particularly eventful. In this post, we’ll give an update on the situation and malware developments.
The FBI custom-designs malware to snare suspects, a court has heard, and has been able “for years” to watch suspects through PC webcams, a court has heard. The teams operate "like normal hackers" - and rely on phishing and other criminal techniques.
APTs - or Advanced Persistent Threats - are the most menacing cyber attack there is, some say. Built to be stealthy, they penetrate networks, steal secrets - and vanish. 'Catching' one was a little like finding Bigfoot - but the much-hyped threat wasn't quite so scary up close...
As wireless technologies and electronic controls are increasingly built into cars, vehicles could become vulnerable to hackers - either stealing information, or injecting malware, a U.S. Senator warned - inspiring debate on how real this threat is.
Only weeks after Microsoft unveiled a global Cybercrime Center armed with new, hi-tech tools to combat crime, it announced it had carried out a global action leading to "significant disruption" of the Siferef botnet, a network controlling up to two million "zombie" PCs.
Once in a while we get to spend time analyzing malicious code that is not as widespread as other threats we've encountered. Here we analyze a targeted attack used in Taiwan and Vietnam - but is this 'APT' really that advanced?
A vulnerability in Android could allow attackers to “unlock” phones without cracking PIN codes - using malware to deactivate Google’s locks on handsets and tablets. The vulnerability can “turn off” all locks a user puts in place.
An audio communication system designed for ultrasonic underwater communications can be used to steal data - even from disconnected PCs in secure environments, by relaying it to the outside world from PC to PC through computer speakers, researchers claim.
An Iranian news agency has said that “malware worse than Stuxnet” may soon be unleashed, to “spy on and destroy the software structure of Iran’s nuclear program".