The US Department of Justice's announcement yesterday of the takedown of the command and control (C&C) servers for the Coreflood bots (detected...
Here’s a little information from ESET’s point of view about the Coreflood botnet, whose C&C (Command and Control) servers were taken down...
Many Facebook users are annoyed to discover that their names and faces can be used in sponsored FB ads. Indeed, according to...
One that will be of most interest to our readers in the UK, I guess. Our friends at Virus Bulletin are holding another...
I've added some commentary and resources on the Japan earthquake/tsunami disasters to an independent blog I maintain that specializes in hoaxes, scams and...
...today I'm waxing nostalgic about a piece of malware. Not one of those anniversaries that have filled so many blogs, articles and...
Added 5th March 2011 to the Stuxnet resources page at http://blog.eset.com/?p=5945...
...all the relevant malware they've seen uses exploits that are restricted to Android OS 2.2 and below...
Social Security Numbers: Identification is STILL not Authentication...
At a time when Gartner estimates that we'll have downloaded 17.7 billion + mobile apps worldwide by the end of this year,...
Aryeh Goretsky posted a blog about a trojan program in a Microsoft catalog update. I thought it might be a little interesting...
UPDATE #1 Randy Abrams has posted a follow-up article, Anatomy of a Biting Bunny – The Infected Microsoft Catalog Update with additional information...
Just a quick follow up on the Microsoft Security Advisory (2501696) post that my colleague Randy Abrams wrote about on January...
A recent article at http://www.thinq.co.uk/2011/1/20/android-trojan-captures-credit-card-details/#ixzz1Bb8RGsWS describes how an attack against Android based phones might be able to capture your credit card information...
...many scams work by panicking victims into taking some unwise action, whether it's parting with their credit card details or opening a...
..."It" is a ZDNet article - well, more like a slide show - by Zack Whittaker, called January 2011: The Definitive Facebook...
The Lookout Mobile Security company is reporting a new trojan horse program that runs on Android based phones. The novel thing about...
It is generally well-understood that antimalware programs—the software which detects computer viruses, worms, trojan horses and other threats to your system—work by...
...Andrew Lee conducted a fun but disquieting thought experiment in the course of an amusing and informative presentation on user education at...
My colleague Urban Schrott, from ESET Ireland, wrote a nice feature article for our monthly ThreatSense report (which should be available shortly...