Cyber Security

0 Comments
ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven Among the most significant malware-induced cybersecurity incidents in recent years were the attacks against the Ukrainian power grid
0 Comments
The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets California has passed a piece of legislation that bans weak default passwords on internet-connected devices sold in the region. Under the “Information privacy: connected devices” bill – which is the first Internet-of-Things (IoT)
0 Comments
A closer look at the technology that is rapidly growing in popularity Blockchain is generally associated with Bitcoin and other cryptocurrencies, but these are just the tip of the iceberg.  This technology was originally conceived in 1991, when Stuart Haber and W. Scott Stornetta described their first work on a chain of cryptographically secured blocks, but only gained notoriety in
0 Comments
Some tips for helping to keep your data more secure from the floor of VB 2018 With the proliferation of more advanced and freely available toolsets, commoditization of attack launch platforms, and availability of wholesale large-capacity network bandwidth for rent, cyberattack velocity is ramping up. If there’s a new vulnerability released you’ll get hit harder
0 Comments
WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals Information and communications technologies permeate our day-to-day lives and are vital for the daily operations of both enterprises and governments. This
0 Comments
It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps Facebook disclosed on Friday, September 28, that attackers had exploited a flaw in its code that allowed them “to steal Facebook access tokens which they
0 Comments
ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and data breaches, giving
0 Comments
The timing of the attacks suggests that many attempts to take the networks offline may not necessarily be perpetrated by organized cybercriminal gangs Students and staff are suspected to be behind many distributed denial-of-service (DDoS) attacks at colleges and universities in the United Kingdom, recent research suggests. The non-profit Jisc – which among other things
0 Comments
Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry? There are few things that cause the computer security industry more concern than the need to avoid “false negatives”. While no product or technology is a silver
0 Comments
Public speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message Even though the first part of this series has not yet been published at the time of writing, it will not surprise me if some of the feedback
0 Comments
ESET researchers have discovered new DanaBot campaigns targeting a number of European countries Recently, we have spotted a surge in activity of DanaBot, a stealthy banking Trojan discovered earlier this year. The malware, first observed in campaigns targeting Australia and later Poland, has apparently expanded further, with campaigns popping up in Italy, Germany, Austria, and
0 Comments
The skimmer, injected into the store’s payment page, harvested credit-card details from the store’s online customers for more than a month The major electronics and computer hardware retailer Newegg has announced that attackers have compromised its online payments system, potentially scooping up buyers’ credit-card data over a period of more than a month. “Yesterday we
0 Comments
Speaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery As the (security) conference season draws nearer, my thoughts return to the many presentations I’ve suffered and inflicted over the past three decades. (Don’t get me wrong: there have also been many I’ve enjoyed.)
0 Comments
ESET researchers have discovered several third-party add-ons for the popular open-source media player Kodi being used to distribute Linux and Windows cryptocurrency-mining malware If you use Kodi, you may have noticed that a popular, Dutch repository for third-party add-ons, XvBMC, was recently shut down upon copyright-infringement warnings. Following the shutdown, we discovered that the repository