This blog is a bit of an oddity. ESET UK were approached by Dan Damon, a reporter putting together a piece about...
The first public beta for ESET NOD32 Antivirus for Mac OS X Desktop is now available. "Based on our technology for BSD, Linux,...
A few months ago Randy and I put together a white paper on password “good practice” (http://www.eset.com/download/whitepapers/EsetWP-KeepingSecrets20090814.pdf). In it, I quoted the...
I wanted to share with you some more results from the cybercrime survey ESET commission and recently released. You can find the...
An Australian company claims to have launched a “virus-proof” computer. They even say “ A fast, easy to use, computer that never...
Cyber Monday is the Monday that follows Thanksgiving in the USA. This is said to be the busiest online shopping day of...
Recently I blogged (Once Upon A Cybercrime…) about a survey ESET commissioned which indicated that Mac users are victims of cybercrime as...
I recently learned a new acronym: SODDI (Some Other Dude Did It). What this refers to is the defense that criminals routinely...
As usual, ESET has released its monthly Global Threat Trends Report, which will be available in due course at http://www.eset.com/threat-center/index.php. There are...
Specifically spear-phishing, where the target is deliberately selected, as opposed to a random untargeted attack. An article at Dark Reading.com discusses the...
For many years banks and credit card vendors have accepted that there will be some amount of fraud and built those costs...
Oh brother, don’t tell me you fell for that one! All capital letters, lots of exclamation marks, the classic signs of bad...
[Update: I notice that at about the same time that I posted this, Sophos also flagged a blog reporting a somewhat similar fake...
I was quoted last month in an article at PC Retail (http://www.pcr-online.biz/features/305/The-truth-about-cyber-crime), which is nice. However, I just came across the notes I made at...
The Wall Street Journal recently ran an interesting article at http://online.wsj.com/article/SB125487044221969127.html. Of note, was a quote from Los Angeles District Attorney Steve...
ESET released its Global Threat Report for the month of September, 2009, identifying the top ten threats seen during the month by...
“Now may I suggest some of the things we must do if we are to make the American dream a reality. First,...
Bonjour mes amis! Well, I am in Switzerland, and very close to the French border, for the Virus Bulletin conference – perhaps...
Modern cars are designed with crumple zones. These crumple zones help to decrease the risk of death in a severe car accident....
We’ve just added my paper “The Game of the Name: Malware Naming, Shape Shifters and Sympathetic Magic” to the White Papers page. This...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment