Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.
Published on: December 19, 2014 | Source:The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.
Published on: December 18, 2014 | Source:As regular readers will know, every year we publish our predictions on cybercrime attacks for the year ahead. Well, our South American research team has spent the last few weeks putting together our predictions for 2015.
Published on: December 18, 2014 | Source:Today, we are publishing research on ransomware that emerged in 2014. We have posted blog articles about this threat before, to raise awareness when we realized the criminals were targeting the United Kingdom and Spain.
Published on: December 16, 2014 | Source:Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.
Published on: December 16, 2014 | Source:Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.
Published on: December 11, 2014 | Source:Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves - if not more so. Lock yours down with our tips.
Published on: December 08, 2014 | Source:Firefox 34, the latest version of the Mozilla's popular web browser has disabled support for SSL 3.0 in reaction to the POODLE exploit, reported by We Live Security back in October.
Published on: December 04, 2014 | Source:Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, itβs easy to sort the genuine bargains from the too-good-to-be-true fakes.
Published on: November 27, 2014 | Source:Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or sponsored by nation states. Does an average person or business really need to worry about these things?
Published on: November 26, 2014 | Source:Self-driving cars are just around the corner, with the UK government putting up 10 million (around $15.6 million) for cities to pilot trials as soon as next year, but the country's Institute of Engineering and Technology (IET) today issued stern warnings about the security of the technology.
Published on: November 25, 2014 | Source:It's easy to imagine that ALL connected devices - from fridges to CCTV cameras - are a security nightmare, but there are simple, sensible steps you can take to lock these risks down.
Published on: November 24, 2014 | Source:The long-term health effects of electronic cigarettes - or E-cigarettes - are still open for discussion - but the devices could harm your computer, at least if one report is to be believed.
Published on: November 22, 2014 | Source:Microsoft released a patch last week for a critical vulnerability allowing remote code execution in Internet Explorer. This vulnerability is significant because it exploits an old bug present in Internet Explorer versions 3 through 11.
Published on: November 20, 2014 | Source:Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring similar results from two different privacy and security surveys conducted by ESET.
Published on: November 17, 2014 | Source:For ordinary laptop and smartphone users, Wi-Fi is not ideal - but itβs sometimes near-inescapable.
Published on: November 14, 2014 | Source:APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.
Published on: November 14, 2014 | Source:ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them embarrassed if lost.
Published on: November 14, 2014 | Source:Microsoft's .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.
Published on: November 13, 2014 | Source:After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one
Published on: November 12, 2014 | Source:The Sednit espionage group, also known as the Sofacy group, APT28 or βFancy Bearβ, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- βair-gappedβ networks -- and exfiltrate sensitive files from them through removable drives.
Published on: November 11, 2014 | Source:Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Appleβs own system, and rivals playing catch-up.
Published on: November 07, 2014 | Source:A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.
Published on: November 06, 2014 | Source:Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.
Published on: October 31, 2014 | Source:Learn how to update Adobe Flash Player, to help protect against malware attacks.
Published on: October 31, 2014 | Source:An army of the undead, wreaking havoc on the Internet β it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.
Published on: October 23, 2014 | Source:Last month, we presented βThe Evolution of Webinjectβ in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.
Published on: October 23, 2014 | Source:Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
Published on: October 22, 2014 | Source:In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
Published on: October 21, 2014 | Source:As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
Published on: October 20, 2014 | Source:Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.
Published on: October 17, 2014 | Source:Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.
Published on: October 16, 2014 | Source:Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.
Published on: October 15, 2014 | Source:In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.
Published on: October 14, 2014 | Source:For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation - we offer a few tips on how to get the most from the emoji-heavy network here.
Published on: October 09, 2014 | Source: