Latest Articles

Ukraine Crisis – Digital Security Resource Center

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

Ukraine Crisis – Digital Security Resource Center

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks

Anton Cherepanov and Robert Lipovsky17 Oct 2018


Phishers are after something unusual in ploy targeting book publishers

Phishers are after something unusual in ploy targeting book publishers

Phishers are after something unusual in ploy targeting book publishers

In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things

Tomáš Foltýn16 Oct 2018


Facebook downgrades victim count, details data accessed in breach

Facebook downgrades victim count, details data accessed in breach

Facebook downgrades victim count, details data accessed in breach

While the number of victims is lower than previously thought, the data accessed for millions of them is more sensitive than originally believed

Tomáš Foltýn15 Oct 2018


The Occasional Orator Part 3

The Occasional Orator Part 3

The Occasional Orator Part 3

Proper preparation can make all the difference when it comes to speaking at conferences

David Harley15 Oct 2018


Tips for minding the digital skills gap

Tips for minding the digital skills gap

Tips for minding the digital skills gap

The times they are a-changin‘, so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution?

Tomáš Foltýn12 Oct 2018


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

TeleBots: First evidence linking Industroyer to NotPetya

Shane Curtis12 Oct 2018


Ukraine Crisis – Digital Security Resource Center

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

Ukraine Crisis – Digital Security Resource Center

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven

Anton Cherepanov and Robert Lipovsky11 Oct 2018


Scams

Send in the clones: Facebook cloning revisited

Send in the clones: Facebook cloning revisited

Scams

Send in the clones: Facebook cloning revisited

As another confusing message spreads, we look at Facebook privacy, cloning, and hacking

David Harley11 Oct 2018


Internet of Things

California outlaws poor default passwords in connected devices

California outlaws poor default passwords in connected devices

Internet of Things

California outlaws poor default passwords in connected devices

The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets

Tomáš Foltýn10 Oct 2018


Google+ to shut down due to lack of adoption and privacy bug

Google+ to shut down due to lack of adoption and privacy bug

Google+ to shut down due to lack of adoption and privacy bug

Google has found no evidence of misuse of user information courtesy of a security glitch in the social platform’s API

Tomáš Foltýn10 Oct 2018


Privacy

Blockchain: What is it, how it works and how it is being used in the market

Blockchain: What is it, how it works and how it is being used in the market

Privacy

Blockchain: What is it, how it works and how it is being used in the market

A closer look at the technology that is rapidly growing in popularity

Cecilia Pastorino09 Oct 2018


Most routers full of firmware flaws that leave users at risk

Most routers full of firmware flaws that leave users at risk

Most routers full of firmware flaws that leave users at risk

If you own a Wi-Fi router, it may well be riddled with security holes that expose you to a host of threats

Tomáš Foltýn08 Oct 2018