Award-winning news, views, and insight from the ESET security community
Independent Correspondent
Samsung Pay 'safe' from LoopPay attack
Global cost of cybercrime ‘continues to rise’
New YiSpecter malware attacks iOS devices without jailbreak
Cybercrime
Cybercrime ‘more threatening than ever’
Samsung denies that Samsung Pay has been affected by an attack on LoopPay, a startup that it recently acquired to develop its mobile payment system.
Karl Thomas • 08 Oct 2015 • 1 min. read
A new report from the Ponemon Institute reveals that the global cost of cybercrime to businesses shows no signs of slowing down.
Karl Thomas • 07 Oct 2015 • 1 min. read
A new malware identified as YiSpecter attacks iOS devices with and without jailbreak, researchers from Palo Alto Networks have revealed. ESET has detected this malware as a trojan with both variants iOS/YiSpecter.A and iOS/YiSpecter.B.
Karl Thomas • 06 Oct 2015 • 1 min. read
Cybercrime is more aggressive and confrontational than it has ever been, Europol's latest Internet Organised Crime Threat Assessment (IOCTA) has stated.
Karl Thomas • 05 Oct 2015 • 3 min. read
Experian experiences T-Mobile data breach
Experian has revealed that information belonging to T-Mobile, which was housed on one of its servers, has been accessed by cybercriminals in a data breach.
Karl Thomas • 02 Oct 2015 • 1 min. read
Significant WinRAR vulnerability identified
An expert says that the popular compression tool WinRAR contains a significant vulnerability that exposes it to an attack.
Karl Thomas • 30 Sep 2015 • 1 min. read
Virtual skyscraper Cyphinx hopes to find cyber talent
A 3D skyscraper has been developed to help the Cyber Security Challenge find the next generation of cyber talent.
Karl Thomas • 30 Sep 2015 • 2 min. read
Kids Online
UK parents ‘want minimum age for smartphone ownership’
A survey has found that most parents in the UK are keen to see a minimum age introduced for smartphone ownership.
Vulnerable medical equipment details disclosed online
Vulnerable hospital equipment details can be found online, two security researchers have found.
Karl Thomas • 29 Sep 2015 • 1 min. read