Despite Snowden’s voluntarily offer to help Brazil in investigating National Security Agency’s (NSA) spying activities against the country, the land of beauty...
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR...
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to...
The two million people who had chosen “123456” as their Adobe password were widely mocked online after the company's security breach -...
(All four blog articles in this series, of which this article is the last, are available as a single paper here: The_Thoughtful_Phisher_Revisited.)...
Facebook detects and stores everything you type on the social network even if the message is not published. Most of us are...
The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being...
A Firefox add-on has turned 12,500 users of the browser into a botnet which scours every page visited by infected users for...
A new ‘Smart ID’ card, BluStor, aims to “eliminate hacking and identity theft” - using a combination of voiceprints, fingerprints and iris...
The assault by cybercriminals against big businesses continued this year -78% were attacked by outsiders, according to a report by Price Waterhouse...
The like button is a highly interactive feature of social media giant Facebook. A British public-service television broadcaster has however revealed that hackers are...
An international plot which would have turned huge numbers of PCs into “bricks” by using deeply buried malware was foiled by the...
It seems as if those business which bowed down in front of NSA are now facing a backlash. That’s what we can...
Twelve municipal guards in the city of Araraquara (273 km from Sao Paulo) Brazil have been suspend from their jobs of monitoring...
The official website of Nigerian Federal Ministry of Finance (http://www.fmf.gov.ng ) has been hacked and defaced by world renowned hackers from Moroccan Ghosts hacking group. Hackers left a...
A leaked two-page pamphlet for NSA employees reveals the organization instructed each employee on some key “talking points” to bring up in...
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen...
Your next PC password could be President Bill Clinton kissing a fish - and that disturbing mental image, and similar surreal “story...
NSA banks on Google cookies for pinpointing hacking targets. Google cookies which are utilized by advertisers to track consumers are also being used...
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor