Criminals seeking to kill endangered species and sell trophies online are turning to increasingly hi-tech methods to target their prey - including cyber attacks built to steal information on where animals patrol, according to the World Wildlife Fund’s Wildlife Crime division.
Search results for: "game"
Pirated versions of popular Mac apps, spread via torrent sites, try to infect your computer with malware... and steal Bitcoins.
Google has bought a company offering a new form of two-factor authentication - using “silent” sounds played via PC and smartphone speakers to verify a user is who he or she claims to be
Over the past two years, many online services have started to offer ‘two-factor authentication’ - an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use '2FA'.
The key to beating hackers might not just lie in stronger security measures and ‘unbreakable’ passwords. Now, it seems like an element of trickery is required – almost beating hackers at their own game. Two independent security researchers have developed a system which they call ‘Honey Encryption’, which promises to make it harder for hackers
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 - so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google's OS...
A phishing scam targeting Tesco bank customers puts on a festive party hat and pretends to offer something for nothing. Is this a topical trend?
ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi‑tech malware
The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.
Fingerprint identification systems could sweep through the world faster than most have predicted, according to Ericcsson, the world’s largest cellphone network maker - based on opinion polls of 100,000 smartphone users around the world.
Have you been wondering what trends in security and privacy ESET researchers are predicting for 2014? The following is a sampling, a year-end snack plate if you will, featuring predictions from Aryeh Goretsky, Righard Zwienenberg, David Harley, Cameron Camp, Lysa Myers, and more.
Few things are sacred to today’ cybercriminals - and true love certainly isn’t one of them. Dating scams are a fast-growing area of cybercrime - rising by a third year-on-year in some countries, and ranging from fraud, to identity theft to malware attacks. Here's how to stay safe.
YouTube comments channels are widely known as a toxic and hostile environment - but Google has admitted that YouTube’s recent integration with Google Plus has made things even worse.
Human heartbeats are near-unique - each person’s rhythm forms a mathematical pattern which can be used to identify people. A bracelet which aims to use this for secure ID took a big step towards PCs and phones in the home this week, as 6,000 developers began work on apps for it.
The company, E-Sports Entertainment, served up malware which used PCs to mine Bitcoins, an attack which earned $3,602. The malware was delivered surreptitiously alongside the company's official client.
Don't let cybercriminals spoil your holidays! Our tips will ensure you don't get fooled by the latest scams while you hunt down the best deals for your family.
Half of the world's 50 biggest banks have faced security incidents affecting their web applications. Fifteen per cent of those incidents were classified as “high” or “critical” risks, a new study has revealed.
Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on assuring their online safety more urgently than victims of stalking and domestic abuse. What can people do to protect themselves when there is a known and persistent threat?
On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world. It spread via the internet - and its release marked a new dawn for malicious software. Our five facts highlight what has changed since - and what hasn't.
Ransomware can be among the most frightening forms of malware - suddenly, your screen is replaced by a message from the police, demanding money, or a message saying your files are lost unless you pay a ransom to unlock them. Our tips will help you fight back.
Grand Theft Auto V sold more than $1 billion worth of units in a week - no wonder cybercriminals are tempted to cash in. A torrent offering the game on PC has been downloaded "thousands" of times, sites report.