ESET researchers have been looking into OSX/Keydnap, a Trojan stealing passwords and keys out of OSX keychains by creating a permanent backdoor. While still not clear how victims become exposed, it is thought that it could be spread via attachments in spam messages, downloads from untrusted websites or other vectors.July 5, 2016 | Athens, Greece
Data leaks and breaches are alarmingly common, but there are still many misconceptions as to how and why they happen.July 1, 2016 | Athens, Greece
Courtesy of Facebook, Twitter, Instagram and Snapchat – to name but a few – we are increasingly living digital lives, where we interact and engage with our friends and family online. Social media has, without a shadow of a doubt, become central to our way of life.July 1, 2016 | Athens, Greece
Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit. Using powerful filters, various methods of communication with its operators and an interesting persistence technique, it aims to exfiltrate selected files from governmental and public institutions, which are mostly focused on economic growth and cooperation in Central and Eastern Europe.June 29, 2016 | Athens, Greece
Data leaks, as we will explore in an upcoming feature, can emerge in numerous ways. Knowing where your weak spots are as organization is, of course, important, but equally, ensuring that you actively do everyone you can to stay secure is vital to ensure you are protected.June 29, 2016 | Athens, Greece
Forty-nine years ago, if you needed cash you had to head to your bank and request it from the clerk at the counter. But on the 27th of June 1967, all that changed. On that day Londoners had their first opportunity to withdraw funds from their accounts via a new specialized cash machine, which later became known as an automated teller machine, or ATM for short.June 27, 2016 | Athens, Greece
When talking about the attacks and threats users must face every day, people often highlight those that are more or less predictable, such as malicious archives sent as email attachments. Even though these threats are still very present (e.g. in the different ransomware variants), cybercriminals also use many other attack vectors. Some of the most dangerous are those that involve scripts, since they are difficult for users to detect.June 21, 2016 | Athens, Greece
Summer holidays kick off in a few days and most schoolchildren are looking forward to taking a break from homework and waking up early. Some of them however, have different reasons as to why they enjoy not going to school for a while – bullies, who bother them offline or online over social networks.