The death of Osama bin Laden has gone viral, with blogs, social media and search engines pumping terabytes of rumor, innuendo and...
[NOTE: As we were publishing this articl, our Latin American office discovered another Black Hat SEO campaign incorporating promises of Osama bin...
Not using Twitter or Facebook is, in these times, akin to not owning or using a mobile ‘phone. Last night’s events –...
Yesterday the U.S. president, Barak Obama, held a conference at the White House to announce that the leader of Al Qaeda, Osama...
As I have blogged about the Android platform a recurring comment has been “When will ESET have protection for my Android?” Well,...
The US Department of Justice's announcement yesterday of the takedown of the command and control (C&C) servers for the Coreflood bots (detected...
Here’s a little information from ESET’s point of view about the Coreflood botnet, whose C&C (Command and Control) servers were taken down...
Many Facebook users are annoyed to discover that their names and faces can be used in sponsored FB ads. Indeed, according to...
One that will be of most interest to our readers in the UK, I guess. Our friends at Virus Bulletin are holding another...
I've added some commentary and resources on the Japan earthquake/tsunami disasters to an independent blog I maintain that specializes in hoaxes, scams and...
...today I'm waxing nostalgic about a piece of malware. Not one of those anniversaries that have filled so many blogs, articles and...
Added 5th March 2011 to the Stuxnet resources page at http://blog.eset.com/?p=5945...
...all the relevant malware they've seen uses exploits that are restricted to Android OS 2.2 and below...
Social Security Numbers: Identification is STILL not Authentication...
At a time when Gartner estimates that we'll have downloaded 17.7 billion + mobile apps worldwide by the end of this year,...
Aryeh Goretsky posted a blog about a trojan program in a Microsoft catalog update. I thought it might be a little interesting...
UPDATE #1 Randy Abrams has posted a follow-up article, Anatomy of a Biting Bunny – The Infected Microsoft Catalog Update with additional information...
Just a quick follow up on the Microsoft Security Advisory (2501696) post that my colleague Randy Abrams wrote about on January...
A recent article at http://www.thinq.co.uk/2011/1/20/android-trojan-captures-credit-card-details/#ixzz1Bb8RGsWS describes how an attack against Android based phones might be able to capture your credit card information...
...many scams work by panicking victims into taking some unwise action, whether it's parting with their credit card details or opening a...
..."It" is a ZDNet article - well, more like a slide show - by Zack Whittaker, called January 2011: The Definitive Facebook...