We all have recently endured a week or so of extensive media hype about a worm called “Conficker”. Phrases such as “One...
When I write about Mac issues, I usually find myself abused by individuals convinced that there are no Mac viruses, never were...
I’ve mentioned here before that targeted malware, often delivered by “spear phishing” carried by apparently “harmless” documents such as PDFs, .DOCs and...
I just picked up a comment made today on a post Randy made about the comparative security of Macs and PCs. Since...
Someone raised an interesting point in a comment to yesterday’s blog about Symantec’s own PIFTS.EXE being flagged by their own firewall as...
I recently had the fantastic opportunity to participate on a panel discussion concerning cyber security. The event was hosted by the Bellevue...
As Valentine’s Day is approaching the criminals behind Win32/Waledac have increased their activity. The Valentine campaign started some time ago but the...
Back in January I blogged about a shortcoming of HIPAA. HIPAA legislation is, in part, supposed to help protect our privacy when...
Here at ESET we have just released our Global ThreatTrends report for January 2009. Not surprisingly, at the top of the list...
Well, this actually isn’t a lie, but a lot of what you read on the web are lies designed to steal money...
…no promise of chicks for free, but I did get spam this morning offering me a “Free-Trial kit” for some scheme for...
You may have noticed that I’ve been making a lot of references to this over the past few weeks. You can now...
Today is inauguration day in the USA. As I traveled to many countries late last year I was amazed at how joyous...
The top ten (twenty, twenty-five…) season doesn’t seem to have finished yet: the latest to cross my radar was something like seven...
You might have noticed that Conficker (Downadup) is actually standing up rather well to all the attention it’s receiving at the moment....
CNN reported that there a new sleeper virus out there. http://www.cnn.com/2009/TECH/ptech/01/16/virus.downadup/index.html There is nothing sleepy about the Conficker worm, it is wide...
One of the security best practices is to back up your data regularly. This is sound advice as it helps mitigate the...
There are different techniques that can be used by a program to identify in which country it has been installed. It can...
This is bizarre, if slightly nostalgic. I spent a lot of time in the first half of this decade writing and presenting...
Many people in the US associate HIPAA with the rules required to protect medical data. It actually is a lot more than...
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
New Threat Actor ‘Void Arachne’ Targets Chinese Users with Malicious VPN Installers
Warning: Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
NiceRAT Malware Targets South Korean Users via Cracked Software
Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks