Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.
Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.
United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous Casper, Bunny and Babar malware.
What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?
Garage doors may be vulnerable to being opened remotely by hackers using little more than a children’s toy, a security researcher has proven this week.
ESET has discovered over 30 scareware apps available for download from the Google Play store. The apps have been installed by more than 600,000 Android users.
The website of celebrity TV chef and food activist Jamie Oliver has been compromised with malware for the third time this year, potentially infecting the computers of the site’s visitors.
This guide offers you five informative tips on how best to avoid ransomware in your email, which is a common way for extortion-based malware to propagate itself.
Not only is Brazil one of the most populated countries in the world, but it is also one of the countries with the highest percentage of Internet users using online banking. The latest research from ESET is now available: CPL Malware in Brazil.
Researchers have uncovered a new malware which will try to ‘destroy’ the computer, reports Cisco. Let’s understand how it really is.
What’s the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.