Another day, another Facejack attack. We see a lot of these sorts of scams, alluringly titled posts – typically with a promise...
...35% of iPhone/Android users in the US interact with their smartphones before they get out of bed...
An article came out yesterday from Clement Genzmer who is a security engineer at Facebook. His tagline is "searching and destroying malicious...
Our colleagues Aleksandr Matrosov and Eugene Rodionov are tracking the evolution of TDL4 (also known as Win32/Olmarik). The following is a report...
The death of Osama bin Laden has gone viral, with blogs, social media and search engines pumping terabytes of rumor, innuendo and...
[NOTE: As we were publishing this articl, our Latin American office discovered another Black Hat SEO campaign incorporating promises of Osama bin...
Not using Twitter or Facebook is, in these times, akin to not owning or using a mobile ‘phone. Last night’s events –...
Yesterday the U.S. president, Barak Obama, held a conference at the White House to announce that the leader of Al Qaeda, Osama...
As I have blogged about the Android platform a recurring comment has been “When will ESET have protection for my Android?” Well,...
The US Department of Justice's announcement yesterday of the takedown of the command and control (C&C) servers for the Coreflood bots (detected...
Here’s a little information from ESET’s point of view about the Coreflood botnet, whose C&C (Command and Control) servers were taken down...
Many Facebook users are annoyed to discover that their names and faces can be used in sponsored FB ads. Indeed, according to...
One that will be of most interest to our readers in the UK, I guess. Our friends at Virus Bulletin are holding another...
I've added some commentary and resources on the Japan earthquake/tsunami disasters to an independent blog I maintain that specializes in hoaxes, scams and...
...today I'm waxing nostalgic about a piece of malware. Not one of those anniversaries that have filled so many blogs, articles and...
Added 5th March 2011 to the Stuxnet resources page at http://blog.eset.com/?p=5945...
...all the relevant malware they've seen uses exploits that are restricted to Android OS 2.2 and below...
Social Security Numbers: Identification is STILL not Authentication...
At a time when Gartner estimates that we'll have downloaded 17.7 billion + mobile apps worldwide by the end of this year,...
Aryeh Goretsky posted a blog about a trojan program in a Microsoft catalog update. I thought it might be a little interesting...
Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users
Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders
U.S. Government Offers $10 Million Reward for Information on Conti Ransomware Gang
Cisco Patches High-Severity Vulnerability Affecting ASA and Firepower Solutions
Researchers Warn of Ongoing Mass Exploitation of Zimbra RCE Vulnerability
Conti Cybercrime Cartel Using ‘BazarCall’ Phishing Attacks as Initial Attack Vector
Cisco Confirms It’s Been Hacked by Yanluowang Ransomware Gang
Hackers Behind Cuba Ransomware Attacks Using New RAT Malware
GitHub Dependabot Now Alerts Developers On Vulnerable GitHub Actions
Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers
The Business of Hackers-for-Hire Threat Actors
Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
Microsoft Issues Patches for 121 Flaws, Including Zero-Day Under Active Attack
New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains
Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack
Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts
Iranian Hackers Likely Behind Disruptive Cyberattacks Against Albanian Government
Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages
A Growing Number of Malware Attacks Leveraging Dark Utilities ‘C2-as-a-Service’