A flurry of long-overdue government initiatives designed to address cybercrime has begun to actually develop some momentum. When I consider that it...
Two weeks ago I acted as a panelist in a panel discussion at an IT Security conference in Kuala Lumpur. I was...
Engineers are really smart people who often know how to make something with no real world effectiveness work really well without effect....
Back on the 22nd of February, I wrote an entry on this blog called "Does Anybody Know WHOIS Out There?". This entry...
The Apple iPad is the current gadget du jour amongst the digerati and has been seeing strong presales, with estimates as high...
The Anti-Phishing Working Group has asked its members to publicize the forthcoming Counter eCrime Operations Summit in Brazil, which I'm pleased to...
[Update: so far I have two votes for dumb. Maybe I'm giving this spammer too much credit, and it is a simple...
It has been a year since we last discussed fraudulent domain name registrar scams and we wanted to let people know that...
Greetings, friends and fiends. It's been a while since I've been able to blog: I've been trying out one of these vacation...
We have recently seen some reports that give some idea of the real size of the cybercrime problem. Recently Federal Deposit Insurance...
Ford Motor Company has recently announced that later this year it will be producing cars with built-in WiFi capabilities. Since 2008, the...
Let's consider the words of the song "I'll Never Fall In Love" by Burt Bacharach and Hal David: "What do you get...
While serving in the Marine Corps, one activity that I felt was effective in preparing both myself and my unit to be...
Perhaps you have seen the recent buzz around Google Buzz. The fact is that Google has decided that anything it knows about...
According to Cell-news.com, in 2007 over 850,000 Brits flushed their cell phones down the toilet. I’m sorry to report that there isn’t...
Recently Eric Schmidt, the CEO of Google, said in an interview “If you have something that you don’t want anyone to know,...
[Part 7 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This...
No, I'm not talking about a newly-discovered and virulent OS X upconversion of SevenDust or AutoStart 9805. Mac Virus is a site...
Wow, I knew it was a problem, but the scope is mind-boggling. At least one of you out there is probably making...
Two new papers have gone up on the ESET White Papers page at http://www.eset.com/download/whitepapers.php. (Strictly speaking, they're not altogether new: they include...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor