The National Security Agency (NSA) surveillance activities revealed by former CIA contractor Edward Snowden appear to be taking a serious toll on public confidence in technology companies in America, such as Internet service providers and software companies, according to a Harris poll commissioned by ESET. The poll found that two-thirds of adult Americans who said
A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans and some say they are doing less online banking and less online shopping because of what they have learned about the NSA.
The Model S is rated one of the safest cars on the road - but the electronic security system protecting its locks may not be quite as bulletproof, researchers claim. The six-digit PIN used to protect its lock can be brute-forced, or phished, by attackers.
Contrary to reports late last week, the BlackBerry smartphones used by White House staffers and the President are not to be replaced by Android or Windows Phone handsets from Korean manufacturers LG and Samsung.
Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all Mac users can update to the latest version freely (providing their machine is up to the new software – which Apple allows you to check here). But under the bonnet of Mavericks lurk
A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS - allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.
Could holes in security code and major information systems in America be due, at least in part, to the dire state of education in subjects like Science, Technology, Engineering, and Mathematics (STEM)?
Phishing is unique among cyber attacks - it doesn’t rely on weaknesses in computer software, or new vulnerabilities - it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams - and why tablet and smartphone users need to stay alert.
Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.
Malicious apps are multiplying rapidly in Google’s Play store - where a survey found that the number of malicious apps had grown 388% from 2011 to 2013, according to Risk IQ.
Internet se ha vuelto masivo, y su utilización se ha vuelto cotidiana. Ahora… ¿qué hay de aquellos que no están acostumbrados a utilizarlo y quieren hacerlo por primera vez? ¿Qué recaudos deben tomar? Desde el Laboratorio de ESET Latinoamérica les brindamos algunos consejos para estar más seguros en su utilización primeriza. Actualmente Internet es accesible
A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves - estimated to be worth $2 million or even more. The site relied on bitcoin to help anonymize transactions.
We Live Security has launched on Flipboard - the hit magazine-style app for Kindle, Android and iOS. Every week, we'll hand-pick the best articles from We Live Security, and the app will automatically keep you up to date with our latest news, features and research.
The group of hackers that calls itself the Syrian Electronic Army (SEA) briefly claimed control of the facebook.com domain via an attack on MarkMonitor. It appears normal Facebook service has been resumed, but here's what you need to know.
Target's 2013 data breach is expanding in scope and scale, requiring additional vigilance on the part of shoppers to protect their accounts and their identity.
En el reciente Chaos Communication Congress, investigadores han dado a conocer cómo atacantes vulneran cajeros automáticos para poder extraer todo el dinero que deseen. El ilícito se lleva a cabo gracias a un dispositivo de almacenamiento USB con contenido malicioso y gran conocimiento de la plataforma atacada. Tiempo atrás, el investigador en seguridad informática neozelandés
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.
A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen their defenses.
News of Amazon's plans to use aerial drones to deliver packages raises the prospect of clashing values in areas like use of air space and technology, not to mention privacy and plain old malice.