Target's 2013 data breach is expanding in scope and scale, requiring additional vigilance on the part of shoppers to protect their accounts and their identity.
En el reciente Chaos Communication Congress, investigadores han dado a conocer cómo atacantes vulneran cajeros automáticos para poder extraer todo el dinero que deseen. El ilícito se lleva a cabo gracias a un dispositivo de almacenamiento USB con contenido malicioso y gran conocimiento de la plataforma atacada. Tiempo atrás, el investigador en seguridad informática neozelandés
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.
A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen their defenses.
News of Amazon's plans to use aerial drones to deliver packages raises the prospect of clashing values in areas like use of air space and technology, not to mention privacy and plain old malice.
A look back at malware failures, malicious code that did not work out as well as the folks behind it had hoped. Can malware spread to quickly for its own good? Can malware authors ever test their wares well enough to work perfectly?
Who is responsible for privacy and online safety on social networks? ESET asked Harris Interactive to poll American adults and found some interesting responses, positive advances in cyber-citizenship, but also some apparent disconnects.
Did you see the recent story about police in England seizing a 3D printer suspected of producing parts for a weapon – a pistol in this case? Yes, the Greater Manchester Police Department was swiftly nipping hi-tech crime in the bud. The only problem: The poor unsuspecting “criminal” was printing out spare parts for a
A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor policies regarding cooperation with government agencies and/or law enforcement using state-sponsored Trojans. This is ESET's official response.
News of the NSA's mass electronic surveillance is having a negative impact on consumer sentiment toward online technology and tech companies, according to recent survey that suggests it could hurt GDP and corporate profits.
If sinister pieces of malicious code could rise from the dead on Halloween, which would be the most scary for antivirus researchers? Here are 5 contenders, with a variety of very nasty traits.
In light of the Snowden/NSA revelations of mass surveillance, 77% of American adults say it is not okay for the government secretly to monitor all of their communications. And some of us are changing how we use the Internet as a result.
The newly published Preliminary Cybersecurity Framework from NIST, part of the federal effort to help critical infrastructure owners and operators reduce cybersecurity risks, is now available for review, with some interesting new language and a final workshop scheduled for November.
Ransomware can be among the most frightening forms of malware - suddenly, your screen is replaced by a message from the police, demanding money, or a message saying your files are lost unless you pay a ransom to unlock them. Our tips will help you fight back.
Acrobat in hands of hackers, millions of customer details stolen, as Adobe admits to “unprecedented” breach
Adobe Systems, makers of popular software such as Acrobat, admitted on Thursday that hackers had penetrated its systems and stolen source code for its Acrobat software, used to make and read PDF files. Adobe also admitted hackers had stolen data on 2.9 million customers.
An exploit for a vulnerability which affects all versions of Microsoft’s Internet Explorer has been released as a module for the popular penetration testing tool Metasploit - sparking fears of a new wave of attacks.
An Israeli security researcher has found another way round Apple’s Fingerprint ID security system - this time via a two-step lock-screen glitch which works with the new iOS update 7.0.2.
Spear-phishing attacks on energy companies are becoming increasingly sophisticated, an expert has warned - and all it takes is one lucky strike to cause devastating damage to the power grid, or to companies which supply oil and gas.
A new cyber defense force is being set up in the UK to protect critical private and government computer networks from attack - “if necessary, to strike in cyberspace,” Britain’s Defense Secretary Philip Hammond has said.