Banks around the world face a looming deadline to upgrade their ATMS - 95% of machines worldwide run Windows XP, which Microsoft will cease to support on April 8. Just 15% of America's ATMs are expected to upgrade by that point.
Vietnamese malware : ‘Single post’ enough to trigger spyware attacks against U.S. bloggers, EFF claims
A Californian blogger was among victims of a malware attack which targeted critics of the communist state in Vietnam, as well as staff at U.S. privacy group Electronic Frontier Foundation.
In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically, or through search engines browsing, to advertisement websites.
Cisco claims in its report that cybercrime is now a global, professional industry - and there is a worldwide shortage of professionals able to defend against such attacks, with new technologies in malware meaning that there is a shortfall of a million IT professionals.
The computer giant announced the change of policy in an official blog post in which it said that although XP was no longer “a supported operating system”, security updates would continue until July 2015.
At CES 2014, the app was king - and more importantly, the appcessory - fridges, lights, appliances and gadgets built for app control. But with companies unveiling door locks controlled via app, should we applaud - or worry?
A secret technology which relied on radio transmissions has allowed the National Security Agency to spy on computers disconnected from the internet - a security measure known as an ‘air gap’, and commonly used to protect machines containing highly sensitive data.
Borrowing tricks from cybercriminals can ‘scare’ web users into safe browsing, Cambridge researchers claim
Computer users often feel bombarded by warnings about malware - particularly in internet browsers, which often repeatedly warn about risky sites - but tricks used by cybercriminals can help stop this, a new paper claims.
Major international cyber attacks follow a pattern - and attacks such as Stuxnet, which targeted Iran's nuclear plant can be predicted by a mathematical model, University of Michigan researchers have claimed.
Malicious software was installed in tills in Target stores across the U.S. and went undetected for weeks, the chain has admitted, harvesting information from the magnetic stripes on customer cards during transactions.
This is the first in a series of two blog posts on the malware family Win32/Boaxxe.BE whose end goal is to drive traffic to advertisement websites by using various click fraud techniques, and thus earn money from these websites as an “advertiser”.
A survey of 22,762 consumers conducted by the British government found that less than half took the most basic steps to protect themselves online, the government revealed as part of a new campaign aimed at consumers and small businesses.
Spy vs spy: New ‘permission management’ app helps to snuff out the bad Android software snooping on you
A new app, Snoopwall, could offfer Android users some protection against apps which listen to user data - and transmit it - a problem that plagues the operating system, by allowing users to monitor apps, and disable their ability to transmit or store data.
Pat Garratt: PC gamers will always be easy prey for cyber gangs – but it’s not ALL our fault, says industry veteran
Patrick Garratt is a 15-year veteran of the gaming industry, having been behind the launches of major news sites such as Eurogamer and VG247 - but in the DIY, anything-goes world of PC gaming, even he still falls for a scam or two. Is it REALLY his fault, though?
Players of the hit game have been targeted with a Trojan disguised as a semi-official add-on client for the game, made by Curse - but it is fake, laced with a Trojan which steals passwords, account emails and authenticator information at once, Blizzard said.
Could new malware steal data from INSIDE your SD card? Researchers claim even solid‑state PC drives could be at risk
Two researchers have demonstrated an attack that could alter and steal data direct from MicroSD cards, using tiny microcontrollers on the cards themselves. The attack could be used to copy or steal data - and even modify sensitive data such as encryption keys.
The ‘Digital Guardian’: IBM’s security expert explains why ‘Steve’ might watch your eating habits to keep you secure
Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction - but very close to reality.
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR conference in Chennai, which was kindly presented by ESET’s Chief Research Officer Juraj Malcho, as neither Larry nor myself were able to attend the conference in the end. The paper is also available
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers - 75% of detections come from this region.
ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi‑tech malware
The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.