UPDATE #1 Randy Abrams has posted a follow-up article, Anatomy of a Biting Bunny – The Infected Microsoft Catalog Update with additional information...
Just a quick follow up on the Microsoft Security Advisory (2501696) post that my colleague Randy Abrams wrote about on January...
A recent article at http://www.thinq.co.uk/2011/1/20/android-trojan-captures-credit-card-details/#ixzz1Bb8RGsWS describes how an attack against Android based phones might be able to capture your credit card information...
...many scams work by panicking victims into taking some unwise action, whether it's parting with their credit card details or opening a...
..."It" is a ZDNet article - well, more like a slide show - by Zack Whittaker, called January 2011: The Definitive Facebook...
The Lookout Mobile Security company is reporting a new trojan horse program that runs on Android based phones. The novel thing about...
It is generally well-understood that antimalware programs—the software which detects computer viruses, worms, trojan horses and other threats to your system—work by...
...Andrew Lee conducted a fun but disquieting thought experiment in the course of an amusing and informative presentation on user education at...
My colleague Urban Schrott, from ESET Ireland, wrote a nice feature article for our monthly ThreatSense report (which should be available shortly...
Our interim analysis of a version of the malware we detect as Java/Boonana.A or Win32/Boonana.A (depending on the particular component of this...
You may have seen some headlines today about a New Java Trojan that attacks Macs. It turns out that it also attacks...
[C. Nicholas Burnett, the manager for ESET LLC's tier three technical support, contributed the following guest blog article on the FireSheep plugin...
What a touching email. Mercy saw my profile and wants to know more about me. She even tells me “please don't forget...
Sure, iPhones are a lot more stable than Androids, but there is one place that Android has it all over the iPhone…...
Back in the early 1990’s I had a 386 with 4 megabytes of RAM and a very large 80 megabyte hard drive....
Surprised to find annual cybercrime damage spread somewhere between 300 million and 54 BILLION? So is the Director of National Intelligence. Today...
In the first two parts (Part 1, Part 2) of this series I discussed some of the privacy issues associated with Flash...
Now that cyberwarfare is out of the bottle, will anyone agree to not use it? In the summer of 1945 in New...
Since its release in 2007, ESET Smart Security has received many accolades for its antimalware, antispam and firewall functions. However, we have...
Really – should any Alpha version be fed through a chipper-shredder like Diaspora has? The basics are simple: The basic premise behind...
Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users
Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders
U.S. Government Offers $10 Million Reward for Information on Conti Ransomware Gang
Cisco Patches High-Severity Vulnerability Affecting ASA and Firepower Solutions
Researchers Warn of Ongoing Mass Exploitation of Zimbra RCE Vulnerability
Conti Cybercrime Cartel Using ‘BazarCall’ Phishing Attacks as Initial Attack Vector
Cisco Confirms It’s Been Hacked by Yanluowang Ransomware Gang
Hackers Behind Cuba Ransomware Attacks Using New RAT Malware
GitHub Dependabot Now Alerts Developers On Vulnerable GitHub Actions
Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers
The Business of Hackers-for-Hire Threat Actors
Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
Microsoft Issues Patches for 121 Flaws, Including Zero-Day Under Active Attack
New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains
Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack
Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts
Iranian Hackers Likely Behind Disruptive Cyberattacks Against Albanian Government
Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages
A Growing Number of Malware Attacks Leveraging Dark Utilities ‘C2-as-a-Service’