Cyber Security

0 Comments
ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk Given our growing digital dependency, cybersecurity incidents and the exploitation of security soft spots can have serious and cascading ramifications for businesses and their customers. Recent history has seen no shortage of high-profile cyberattacks and data breaches, giving
0 Comments
The timing of the attacks suggests that many attempts to take the networks offline may not necessarily be perpetrated by organized cybercriminal gangs Students and staff are suspected to be behind many distributed denial-of-service (DDoS) attacks at colleges and universities in the United Kingdom, recent research suggests. The non-profit Jisc – which among other things
0 Comments
Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry? There are few things that cause the computer security industry more concern than the need to avoid “false negatives”. While no product or technology is a silver
0 Comments
Public speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message Even though the first part of this series has not yet been published at the time of writing, it will not surprise me if some of the feedback
0 Comments
ESET researchers have discovered new DanaBot campaigns targeting a number of European countries Recently, we have spotted a surge in activity of DanaBot, a stealthy banking Trojan discovered earlier this year. The malware, first observed in campaigns targeting Australia and later Poland, has apparently expanded further, with campaigns popping up in Italy, Germany, Austria, and
0 Comments
The skimmer, injected into the store’s payment page, harvested credit-card details from the store’s online customers for more than a month The major electronics and computer hardware retailer Newegg has announced that attackers have compromised its online payments system, potentially scooping up buyers’ credit-card data over a period of more than a month. “Yesterday we
0 Comments
Speaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery As the (security) conference season draws nearer, my thoughts return to the many presentations I’ve suffered and inflicted over the past three decades. (Don’t get me wrong: there have also been many I’ve enjoyed.)
0 Comments
ESET researchers have discovered several third-party add-ons for the popular open-source media player Kodi being used to distribute Linux and Windows cryptocurrency-mining malware If you use Kodi, you may have noticed that a popular, Dutch repository for third-party add-ons, XvBMC, was recently shut down upon copyright-infringement warnings. Following the shutdown, we discovered that the repository
0 Comments
Far-fetched though it may sound, the answer is yes, according to researchers, who show that electrical grids and smart home appliances could make for a dangerous mix Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to
0 Comments
All things labeled Artificial Intelligence (AI) or Machine Learning (ML) are making waves, but talk of them in cybersecurity contexts often muddies the waters. A new ESET white paper sets out to bring some clarity to a subject where confusion often reigns supreme It is no mean feat to find an area in business and
0 Comments
The move is part of a three-pronged plan that is intended to bolster user trust and safety on the photo-sharing platform Instagram has announced that its users will soon be able to secure their accounts with third-party authentication apps. Prior to the announcement of this much-anticipated change, the photo-sharing platform supported only SMS-based two-factor authentication
0 Comments
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year Mobile security plays an increasingly important role in the protection of information assets, and this applies to both home and corporate users. So, this publication will focus on analyzing the
0 Comments
The Bugcrowd crowdsourcing platform launched Bugcrowd University, an educational platform for security researchers that aims to contribute to the development of bug hunting skills Bugcrowd University (BCU) was developed with the aim of promoting the development and education of security professionals, sharing the latest technologies and contributing to the development of bug hunting skills. As