Hacker amasses $620,000 in cryptocurrency using infected computers
A hacker has reportedly harvested over $600,000 in digital currency, using a network of hijacked machines, in what is believed to be the largest fraud of its kind.
A hacker has reportedly harvested over $600,000 in digital currency, using a network of hijacked machines, in what is believed to be the largest fraud of its kind.
A dangerous new strain of malware has been discovered, able to steal banking credentials without alerting users to the interception.
Note-taking and archiving app Evernote has announced that its discussion forum has been hacked, compromising some users’ passwords, dates of birth and email addresses.
Anonymous has fulfilled its promise of conducting cyber attacks on the government of Brazil during the football World Cup. Anonymous has come up with a massive breach of Brazil’s topmost institutions in which emails, passwords, and personal information has been leaked online. All hacks and breaches were conducted under the banner of #OpMundial2014 #OpWorldCup #Freebrazil and […]
A group of hackers claim to have stolen the personal details of some 650,000 pizza lovers, and have threatened to release them to the world if Domino’s Pizza doesn’t cough up a hefty ransom.
Picture-sharing social media site Pinterest appears to have been hacked, as multiple users reported weight-loss spam messages both on Pinterest itself and on Twitter.
A group of hackers going with the handle of Rex Mundi breached into the database of Domino�s Pizza websites in France and Belgium and ending up with access to more than 592,000 records of French customers and 58,000 records of Belgians. Hackers announced the news by using Twitter, and it seems that the reason behind […]
The top three teams from the fifth annual Mayors’ Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North America for five days of hands-on security training and lectures from IT experts, law enforcement, and career advisors.
Graduation is a great time to review your social media profile. Don’t let a wild and crazy social network presence undermine the promise of graduation, your chances for a scholarship, job, internship or other career choices.
Newly stolen credit and debit card details, from cards used in P F Chang’s China Bistro, a nationwide American chain of restaurants, went on sale on an underground website this week at a site best-known for selling off the details of victims of the Target data breach.
A vulnerability in the official Twitter client Tweetdeck left users vulnerable to attack, forcing thousands of users to retweet cryptic lines of code to other users. Twitter repeatedly shut down the service, despite assurances the flaw had been ‘fixed’.
The Bank of England weathers an average of eight cyber attacks including malware-laced “spear phishing” campaigns per week, according to Chief Information Security Officer Don Randall.
With the World Cup in Brazil poised to begin, the whole world is watching – and that includes cybercriminals. Here’s the latest on scam sites, phishing and how to enjoy surfing safely during the competition.
A new intelligence-sharing network aims to protect financial institutions by sharing information between government, security firms and financial institutions to “predict” vulnerabilities.
In a world-first case, biometric facial recognition software has been used to convict an armed robber, with a Chicago robber “matched” from CCTV footage to a mug shot, and sentenced to 22 years in prison.
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.
While surfing Facebook, you must have seen a blue badge indicating verified pages and profiles of famous people such as celebrities, journalists and politicians etc, but looking at verified pages of Anonymous hacktivists was something totally unexpected. Yes! there are two pages on Facebook belonging to the Anonymous hacktivists with verified page status and millions of likes. We saw […]
Your iPad or iPhone’s camera has become immensely powerful after the emergence of iOS 8 Safari’s new version. Its most astounding feature is that you can use it for scanning your credit card details through camera to make payments online. Ensuing Apple’s WWDC keynote released at the start of this week, various supplementary iOS 8 […]
Do you know what ransomware is? Do you know a filecoder from a lockscreen?
Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.
Even smartphone and tablet users who choose a four-digit PIN to protect their device are vulnerable to “shoulder surfers” glimpsing the code and using it later – but an older form of password could come to the rescue…
When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.