latest posts

How to do an APK Analysis Using AppMon

There are a great many tools available to help quickly analyze the behavior of mobile malware samples. In the case of Android, one such app is AppMon.

Colossal DDoS attack in Liberia wipes majority of country offline

Liberia has been hit with a harmful DDoS attack yet, with most of its residents unable to get online. The Mirai botnet is the cause.

I can see your texts: A deep dive into SMS/messaging clients, security, and privacy

ESET’s Michael Aguilar takes a deep dive into SMS/messaging clients, security, and privacy.

William Hill website hit with DDoS attack

UK-based bookmaker William Hill has been hit with a DDoS attack, preventing many of its customers from being able to access its main website.

Estonia: Digital powerhouse offering e-residency to non-nationals

In terms of technological advancement, Estonia is up there. It is, for example, the first ever country to offer e-residency permits to any world citizen.

Flashback Tuesday: The Morris Worm

On November 2nd 1988, the Morris Worm was released, bringing the internet to an effective standstill. It was a seminal moment in internet history.

Linux/Moose: Still breathing

For the past year, ESET and the security firm GoSecure combined their skills in order to research Linux/Moose further. Here’s some of what was uncovered.

Cyberattacks ‘no longer the stuff of spy thrillers’

Cyberattacks are “no longer the stuff of spy thrillers” – they are now a very serious threat to individuals, organizations and economies.

A history of mobile malware from Cabir to SMS Thief

As we continue to do more things with our smartphones, the threat posed by mobile malware increases. Here’s a short history of its development.

10 gadgets every white hat hacker needs in their toolkit

Here’s a list of the 10 tools every white hat hacker needs in their toolkit, says ESET’s Lucas Paus.

Trick or threat? How zombie IoT devices surprised the internet

It seems the current DDoS tactics from cybercriminals is to gain control over millions of IoT devices and direct their power towards any target they choose.

550,000 Australian Red Cross blood donor details leaked

The personal details of 550,000 Australian Red Cross blood donors have been leaked in an event being described as Australia’s largest ever security breach.

International Internet Day: A great network targeted by cybercriminals

As the world celebrates International Internet Day, we take a look at how cybercriminal activity has evolved online.

Nude celebrity photo hacker sentenced to 18 months in prison

At least 50 celebrity Apple iCloud accounts and 72 Gmail inboxes were broken into by 36-year old Ryan Collins, whose victims included Jennifer Lawrence, Kirsten Dunst, Avril Lavigne, Kate Hudson, and Rihanna.

Election hacking FAQ: 2016 US presidential election edition

Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.

Webcam security: Understanding this modern day threat

Who would have thought that webcams could be exploited? Well, they can, and so serious is the issue, that it has the likes of Mark Zuckerberg covering them with up with tape.

The Hive Mind: When IoT devices go rogue

IoT devices, while extremely useful for simplifying various mundane aspects of everyday life, also offer criminals a new attack platform: your appliances.

Lifting the lid on Sednit: A closer look at the software it uses

ESET’s threat analysts have taken a closer look at the software used by Sednit to spy on its targets and steal confidential information.

Webcam firm recalls hackable devices after mighty Mirai botnet attack

Chinese firm says it will recall vulnerable components, but as long as insecure devices continue to be attached to the internet, there will be opportunities for malicious hackers to exploit them and use them for their own ends.

10 things to know about the October 21 IoT DDoS attacks

On Friday October 21st, a series of IoT DDoS attacks caused widespread disruption of legitimate internet activity in the US. Stephen Cobb investigates.

Follow us

Copyright © 2017 ESET, All Rights Reserved.