search slide
search slide
pages bottom
Currently Browsing: Results for Tag "ESET"

Malicious exploit kit targeting Internet Explorer users, on global scale

Malicious exploit kit targeting Internet Explorer users, on global scale Researchers at ESET have discovered a new exploit kit spreading through the internet via malicious ads on reputable websites with high traffic.For the last two months, they’ve seen cybercriminals targeting users of Internet Explorer and scanning their computers for vulnerabilities in Flash Player.

'Avalanche Network' botnet hideout busted; ESET offers cleanup help

'Avalanche Network' botnet hideout busted; ESET offers cleanup help Cybercriminal activity hub Avalanche Network has been busted by law enforcement agencies, ending a long reign of protection for botnet operators.The operators were attempting to hide from takedown and domain blacklisting, but concentrated efforts from enforcement agencies have busted what ESET called a "fast-flux or ever-changing network".

nnected toys and wearables for Christmas? uld be a cyber security risk

nnected toys and wearables for Christmas? uld be a cyber security risk ESET is warning consumers about connected gifts this Christmas season, as the popularity for devices such as wearables, connected toys and baby monitors continues to grow.The cyber security specialists warn these types of devices can be easily hacked by e-criminals, or turned into a threat to consumers’ privacy.

Ransomware to dominate cyber security landscape

Ransomware to dominate cyber security landscape “We anticipate a new trend on the horizon: The Ransomware of Things or RoT, i.the possibility of cybercriminals “hijacking” devices such as home security cameras and then demanding a ransom payment in exchange for restoring control to the user,” ESET says in the report.

nnected car hacking: Who’s to blame?

nnected car hacking: Who’s to blame? This blog, on connected car hacking, is the first of two posts.Recently, I bought a new car, and the sales guy told me I needed the extended warranty because the computer replacement cost more than any other single component on the car, including the engine.

Behind the WhatsApp ‘backdoor’ allegations: An expert's opinion

Behind the WhatsApp ‘backdoor’ allegations: An expert's opinion With WhatsApp denying that its popular messaging app has a backdoor that allows government agencies to snoop and read our messages, app privacy has once again been called into question.ESET senior research fellow Nick Fitzgerald says that the WhatsApp saga demonstrates that the company chose ease of use over better security and privacy, but ‘backdooring’ is an overreaction.

Holding a peace sign in your selfie uld ruin your life

Holding a peace sign in your selfie uld ruin your life A new study out of Japan claims fingerprints can be detected, and potentially stolen, from photos posted on social media.Nick FitzGerald, senior researcher at ESET, says the use of fingerprints is increasingly being considered as an alternative, or supplemental, authentication to passwords and other more traditional means of authentication.

How to stay safe online when heading back to school

How to stay safe online when heading back to school Nick FitzGerald, senior researcher at ESET, has compiled a few cyber security tips for those of you heading back to school in the coming month or two.“More and more children get their first device at primary school,” explains FitzGerald.

Ransomware: Key insights from infosec experts

Ransomware: Key insights from infosec experts Before we entangle ourselves in everything digital that this year has to offer, it’s important to heed expert advice.As recently reported; cybercrime has wriggled its way into 21st century life, wreaking a trail of havoc as it goes.

Entrust your cyber security secrets to a safe pair of hands

Entrust your cyber security secrets to a safe pair of hands Imagine, if you will, that your security is flawless, and not a single other person can access your sensitive accounts or information.How will your loved ones get past your security measures to tend to your affairs?

Online daters beware: Valentine's Day scammers in full swing

Online daters beware: Valentine's Day scammers in full swing “Every year we see a spike in online dating activity around Valentine’s Day,” he says.” For those of you frequenting these online spaces in the lead up to tomorrow, Fitzgerald says there are ways to stay safe and to avoid trouble.

10 reasons why cybercriminals target smartphones

10 reasons why cybercriminals target smartphones But while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger target for cybercriminals.A smartphone knows everything about us The amount of information stored on a smartphone has skyrocketed in recent years.

Here are the top trends in Android ransomware right now

Here are the top trends in Android ransomware right now 2016 brought some interesting developments to the Android ransomware scene, seeing ransomware emerge as one of the most pressing cybersecurity issues on the mobile platform.Authors of lock-screen ransomware, as well as file-encrypting “crypto-ransomware”, used copycat techniques proven effective in desktop malware, as well as develop their own sophisticated methods specifically designed for Android users.

Getting more Instagram followers? uld be a scam

Getting more Instagram followers? uld be a scam Inazigram, the applications harvest Instagram credentials and then send them to a remote server.They appear to have originated in Turkey, but some used English localisation to target Instagram users worldwide.

Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play

Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play Based on ESET’s notice, Google has removed another malicious app from its official Android app store.Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.

Women in cybersecurity: Slowly but surely, change is ming

Women in cybersecurity: Slowly but surely, change is ming These findings make it all the more concerning for the information security industry, in which only 11% of positions in the global cybersecurity workforce are occupied by women.And, as highlighted by the Center for Cyber Safety and Education’s (ISC) Biennial Women in Cybersecurity Report, the workforce gap is “expected to reach 1.

Young cybercriminals ‘more motivated by peer respect than financial gain’

Young cybercriminals ‘more motivated by peer respect than financial gain’ An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.In a case outlined by the report, one youngster told officers: “… it made me popular, I enjoyed the feeling … I looked up to those users with the best reputations”.

Fake Chrome extensions inject de into web pages

Fake Chrome extensions inject de into web pages This is a trojan that redirects the user’s browser to a specific URL, which contains another kind of malicious content.This new redirection points to a download of an extension from the Chrome web store.

Fingerprint security & biometrics: Three major myths busted

Fingerprint security & biometrics: Three major myths busted We debunk three myths in this short feature to bring some clarity to the subject of fingerprint security.They have their own set of unique vulnerabilities, the technology can be exploited and fingerprints can be stolen (and even from photographs).

Online shopping? Four tips for staying secure

Online shopping? Four tips for staying secure According to ESET’s Senior Research Fellow, Nick FitzGerald, every year they see a spike in online sales in the days leading up to Mother’s day.“Unfortunately, this increase in online traffic makes consumers easy targets for cybercriminals looking to deploy scams,” says FitzGerald.