The bug, which has already been fixed by Facebook, allowed access to private user information that could be abused by malicious actors.
Boobytrapped QR code can trick iOS 11 into taking you to a malicious website
2016 witnessed the further spread of the disease we call ransomware. However, it's not the only cyberthreat that service providers must face today.
An interesting DNS hijack that sets the victim's computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat.
Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.
Two thirds of security professionals rate the risk of a future data breach, due to compromised credentials, as medium or high.
It's a tough enough job protecting your home computer, or your business network, against the rising threat of malware and determined hackers... imagine if you were responsible for the security of Britain's nuclear deterrent?
At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For
Former British defence secretary Des Brown called on the British Prime Minister to hold an ‘end-to-end assessment’ of the Trident nuclear program’s cybersecurity, or risk potential weaknesses in the system.
The recommendation by the FBI that victims of ransomware pay up to have their files decrypted created a buzz within IT folks of all kind. It’s time to ask: Should paying the ransom really be considered an option?
Ghosts, monsters and the living dead can all send a chill down one's spine. Ransomware, for some people, is just as spooky. This Halloween, we look at why.
The Internet of Things (IoT) is the latest buzzword taking hold of the technology industry, but what does it mean exactly and how does it impact citizens and businesses? We take a closer look.
Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to help answer this question.
Earlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.
A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer.
The regular occurrence of data breaches is pushing organizations to think more seriously about updating their risk management policies. With that in mind, we look at the top ten things you need to know about cyber insurance, which is fast becoming a business necessity.
Banking trojans are ubiquitous and growing in number and sophistication, largely through trojan downloaders and webinjects. Here are four severe cases.
As part of World Post Day (October 9th), we take a closer look at the many security risks associated with email, the electronic cousin of regular mail.
It is possible to enjoy videogames by applying practical security measures that will keep us safe. In this article, we look at 8 security tips.
The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here's what you need to know.