You may have seen some headlines today about a New Java Trojan that attacks Macs. It turns out that it also attacks...
[C. Nicholas Burnett, the manager for ESET LLC's tier three technical support, contributed the following guest blog article on the FireSheep plugin...
What a touching email. Mercy saw my profile and wants to know more about me. She even tells me “please don't forget...
Sure, iPhones are a lot more stable than Androids, but there is one place that Android has it all over the iPhone…...
Back in the early 1990’s I had a 386 with 4 megabytes of RAM and a very large 80 megabyte hard drive....
Surprised to find annual cybercrime damage spread somewhere between 300 million and 54 BILLION? So is the Director of National Intelligence. Today...
In the first two parts (Part 1, Part 2) of this series I discussed some of the privacy issues associated with Flash...
Now that cyberwarfare is out of the bottle, will anyone agree to not use it? In the summer of 1945 in New...
Since its release in 2007, ESET Smart Security has received many accolades for its antimalware, antispam and firewall functions. However, we have...
Really – should any Alpha version be fed through a chipper-shredder like Diaspora has? The basics are simple: The basic premise behind...
...a piece at Discovery News about 5 Unexpected Threats of Online Social Networking...
In the security industry, we're sometimes over-ready to be over-prescriptive, seeing security and privacy concerns as paramount where others see them as...
Since never changing your password isn't generally a realistic option, and some sites actually prevent you from using good passwords and, even...
I decided to download the card game Solitaire (by ZenTech Labs) on my Android based phone. Being a free app it is...
[UPDATE #1 at 12:15PM: Added more information about location of earthquake and prior scams. AG] We have just heard about the early September...
In addition to recently getting a Droid 2, I purchased a Motorola H17txt Bluetooth headset. When used with a Blackberry or an...
You have to be a real cool cat to get into the Cambridge Who’s Who registry. A few months ago I received...
In my ever-widening circle of anti-cybercrime methodology this particular approach to attribution of the criminals looting the free world makes me particularly...
When I first got my Droid I went to set up my security. The first thing I do with a new mobile...
Installing an application on an iPhone is a bit different than installing an application on an Android based system. With the iPhone...
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024