Cyber Security

0 Comments
What’s in store for automotive security once cars morph into mobile living rooms and working spaces? And how about transportation at large? There is a certain singularity to CES (Consumer Electronics Show), where vehicles, security, and a host of other technologic doodads unite around a given platform, in this case the car. As these converge,
0 Comments
Did malware disrupt newspaper deliveries in major US cities? Here’s what’s known about the incident so far and the leading suspect: Ryuk ransomware. Plus, advice on defending your organization against such attacks. On the morning of Saturday, December 29, 2018, hundreds of thousands of American households were surprised to find that their daily newspaper was
0 Comments
Some useful advice for staying safe while hunting for bargains in this holiday season The holiday sales are here and shoppers will be out hunting for bargains, both online and offline. Retailers will create tempting email campaigns – some are already starting to hit my inbox – and cybercriminals will see the heightened online shopping
0 Comments
The unfortunate implications of a well-intentioned change to Google Play Developer policies – and the negative impact it has on ESET’s Android app customers When downloading an app from the Google Play store it’s likely that you are oblivious, unless you’re an app developer, to the Google Developer Policy that needs to be adhered to
0 Comments
A probe launched immediately after the discovery of the suspected incident has yet to establish the scale of the potential damage The United States’ National Aeronautics and Space Administration (NASA) has notified all of its employees that their personal data may have been exfiltrated in a suspected security incident discovered two months ago. “On Oct.
0 Comments
An interview with ESET researchers Tomáš Gardoň and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian government In a presentation at AVAR 2018, ESET’s Tomáš Gardoň and Filip Kafka uncovered their research of a previously undocumented espionage toolkit, used in targeted attacks against the Malaysian government in mid-2018.
0 Comments
ESET research shows that DanaBot operators have been expanding the malware’s scope and possibly cooperating with another criminal group DanaBot appears to have outgrown the banking Trojan category. According to our research, its operators have recently been experimenting with cunning email-address-harvesting and spam-sending features, capable of misusing webmail accounts of existing victims for further malware
0 Comments
ESET researchers discovered a set of previously undocumented Linux malware families based on OpenSSH. In the white paper, “The Dark Side of the ForSSHe”, they release analysis of 21 malware families to improve the prevention, detection and remediation of such threats SSH, short for Secure SHell, is a network protocol to connect computers and devices
0 Comments
A welcome return to the hacker conferences of yesteryear There used to just be hacker conferences, but now the societal impact of increasingly connected systems seems much higher, so specialty conferences are popping up. Seeking to bring policy-makers and influencers together, where could be a more appropriate location for CyberwarCon than Washington D.C.? Notably, it’s
0 Comments
Fitness-tracking apps use dodgy in-app payments to steal money from unaware iPhone and iPad users Multiple apps posing as fitness-tracking tools were caught misusing Apple’s Touch ID feature to steal money from iOS users. The dodgy payment mechanism used by the apps is activated while victims are scanning their fingerprint seemingly for fitness-tracking purposes. There