latest posts

Don’t buy the elixir of youth: Machine learning is not magic

There is no magic in machine learning. It’s a field of computer science that gives computers the ability to find patterns in huge amounts of data.

Fighting post-truth with reality in cybersecurity

Welcome to the beginning of a new series of short articles focused on the currents state of AI, all the ins and outs of machine learning, and how it affects cybersecurity.

Smartphone sensors ‘can reveal PINs and passwords’

A smartphone’s internal sensors may provide cybercriminals with enough information to be able to guess a user PINs and passwords, according to new research by Newcastle University in the UK.

Top tip for botnet overlords: Don’t vacation in countries that can extradite you to the United States

There’s no doubt that a life of cybercrime can earn its most successful overlords a considerable amount of money, but you will always have to live with the fear that you could be apprehended and – if convicted – spend years in prison.

Spanish Harmada: More on tech support scams

David Harley and Josep Albors on the evolution of tech support scams and why the current high incidence of reports in Spain are significant.

Ghost in the Shell: Fantasy meets reality with cybersecurity themes

With the recent big screen adaptation of Ghost in the Shell, we thought it would be a good idea to review some of the cybersecurity themes it explores.

ISP privacy – how much should it cost?

ISPs have started to monetize customer information quietly while selling them bandwidth. The temptation is strong, as that kind of aggregate data has real value on the secondary market, but what about the customers’ privacy?

Healthcare challenges: Ransomware and the Internet of Things are the tip of the iceberg

ESET’s Lysa Myers discusses the challenges facing healthcare technology, medical and fitness devices and highlights the need to secure medical devices

It’s time to finally say goodbye to Windows XP. And Vista. Again

Three years ago, Microsoft ended its extended support for Windows XP. Today, almost 8% of desktop users worldwide are still run the operating system.

Sathurbot: Distributed WordPress password attack

This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its use of torrents as a delivery medium and its distributed brute-forcing of weak WordPress administrator accounts.

Tax identity fraud: Bringing the fight to this menace

Tax identity fraud is a multibillion dollar industry for criminals. ESET’s Lysa Myers explores new measures and offers some top tips on how to tackle this menace.

Millennials and GDPR ‘pose increased cybersecurity risk to companies’

Millennials and the demands of upcoming GDPR regulations could result in a greater cybersecurity risk for many businesses, new research has suggested.

IAAF: ‘Fancy Bear’ Sednit behind cyberattack

The IAAF has become the latest organization to fall victim to the cybercriminal gang Sednit.

Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play

ESET researchers have discovered a malicious app at Google Play tricking its victims into paying €18 ($19) for Adobe Flash Player.

The right to privacy in the digital era

ESET’s Miguel Ángel Mendoza discusses the right to privacy in the digital era, which is an increasingly important issue.

Backup your (digital) life

In the digital age, data backup is essential. Find out how you can protect yourself ahead of World Backup Day, which falls on April Fool’s Day.

Malware campaign targets open source developers on GitHub

Be on your guard if you’re a developer who uses GitHub – someone could be trying to infect your computer with malware.

Carbon Paper: Peering into Turla’s second stage backdoor

The Turla espionage group has been targeting various institutions for many years. Recently, ESET found several new versions of Carbon.

Close to 1.4 billion data records compromised in 2016

Over a billion data records were compromised globally in 2016, according to Gemalto’s latest Breach Level Index.

How to configure WinDbg for kernel debugging

In this post, Matías Porolli looks at how to configure an environment with WinDbg and virtual machines in order to debug drivers or code running in Windows kernel space.

Follow us

Copyright © 2017 ESET, All Rights Reserved.