For the last few weeks, ESET has been investigating OSX/Keydnap, a malware that steals the content of the keychain while maintaining a permanent backdoor.
A 28 year-old Chicago man has pleaded guilty to using phishing scams to illegally access more than 300 iCloud and Gmail accounts, around 30 of which belonged to celebrities.
When it comes to data leaks, what are the major weak spots you need to be looking out for? This feature explores three common causes.
Welcome to this week’s security review, including a closer look at cash machine security as ATMs turn 49 years old.
Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit.
Fansmitter, a new malware with the capability to extract data from air-gapped computers, has been developed by scientists in Israel.
Social media platforms are increasingly being targeted, as Facebook CEO Mark Zuckerberg found out earlier this month. Here, we look at how to keep your accounts secure.
The Hard Rock Hotel & Casino Las Vegas has experienced a data breach. Its investigation found unauthorized access to its payment card environment.
If you are traveling this summer and taking your gadgets with you, this guide will ensure that you keep cyber safe when on the road.
Knowing where your weak spots are as organization is important, as is ensuring that you actively do everything you can to stay secure from data leaks.
A widespread hoax is being circulated between Facebook users, in the mistaken belief that posting the message will will give them more control over their privacy.
Google’s CEO Sundar Pichai is the latest public figure to have his online accounts hijacked by OurMine.
Some of the most dangerous vectors used by cybercriminals are those that involve scripts, since they are difficult for users to detect, says Josep Albors.
Forty-nine years after the first ATM was installed in London, we ask how secure our cash machines are today?
Welcome to this week’s security review, which includes an in-depth discussion of the most common reasons for corporate data loss.
The seriousness of cyberattacks is such that it should be included in international humanitarian law, a new report from the Global Commission on Internet Governance has said.
Google has just introduced a new feature for users to make its two-step verification (2SV) process easier.
A Facebook post from Mark Zuckerberg 'reveals' that he is serious about security, as it seems to show that his webcam is covered up with tape.
Acer has experienced a major data breach, with up to 34,500 of its customers thought to be affected. It has already submitted a “breach notification sample” to the Office of the Attorney General in California.
ESET's Josep Albors takes a look at the main reasons for corporate data loss, which include undetected drives and devices being dropped from height.