September 19, 2012 | Bratislava

ESET Reveals Further Facts about OS X Flashback Trojan, the Most Widespread Mac Malware to Date

ESET has performed a deeper investigation into the OS X Flashback Trojan on Apple Macs and come up with some interesting facts you might want to consider in order to protect your day-to-day use of Macs at work and home.

July 24, 2012 | San Diego, CA

Free YouTube .mp3 converters – with a free malware bonus

Want to access the music tracks of YouTube.com videos on your iPod but don’t want to pay? You’re not alone. Recently, a crop of websites have popped up offering to convert the audio from videos to .mp3 files that you can then download at no charge.

July 12, 2012 | San Diego, CA

Instagram vulnerability can allow strangers access to your photos and more

Are you one of the 50 million users of Instagram, the photo-sharing service bought by Facebook in April for $1 billion? If so you need to look out for an Instagram update to fix a vulnerability that has just been published by Spanish security researcher Sebastián Guerrero. This vulnerability, which Guerrero has dubbed the "Friendship Vulnerability," allows people you don't know to add themselves as a friend to your Instagram account, with privileges that include viewing photos you thought were Private.[Update: Approximately 4 hours after this post was published, Instagram placed a notice in its Help Center stating that the vulnerability, which they refer to as "Following Bug," has been fixed. They also state that "Never in the course of the bug existing was users' data at risk--and at no point were private photos made public.

July 12, 2012 | Bratislava

ESET partners up with StopBadware for Safer Cyberspace

ESET, the leader in proactive protection celebrating 25 years of its technology this year, announces its partnership with StopBadware, a non-profit organization that makes the Web safer through the prevention, mitigation, and remediation of badware websites. ESET is a staunch supporter of education and academic research, and hopes that its vast knowledge and expertise in the antivirus industry will enrich StopBaware’s discussions and programs. In turn, this co-operation will allow ESET to gain a more extensive insight into the issue and better support website owners whose sites have been infected with malware, educate users browsing the Web and share data with industry stakeholders.

July 10, 2012 | San Diego, CA

Is my business too small to be hacked by a nation-state (or should I worry)?

Small businesses have their hands full these days in light of a down economy, tightening budgets and the steepening pace of business, but with nation-state hacks front and center in the threatscape, should you worry about those too, or are you (and your customers) safe?Nation-state hacks bring to mind images of large defense contractors, big government offices, and/or high profile financial institutions. After all, if a bad actor overseas stole the cutting edge design of a new nuclear reactor, it would be quite a haul for that government and its cronies – and worth their time, money and effort to go after. But you’re a small business, too small to garner that kind of attention, right?Architect firms in Peru no doubt thought along those same lines, up until the time that critical design documents started  “magically” exfiltrating out over the Internet. The malicious software called ACAD/Medre.

June 27, 2012 | San Diego, CA

How much will your driverless car know about you (and who will it tell)?

Following the flurry of press coverage surrounding the proposed next generation of driverless cars, privacy groups are asking questions about what will happen to the data the cars (necessarily) collect, which – in the wrong hands – might prove tempting for abuse.My colleague Stephen Cobb points out a current example in the automotive data gathering realm where Progressive Insurance goes to great lengths to be specific about what data they collect with their Snapshot product, which plugs into your car diagnostic port. They also try to reassure drivers that bad things won’t happen to the data once it’s collected, though they mention it may be used for “research.”The typical assurances against private tracking data going rogue are usually that they’re anonymized.

June 20, 2012 | San Diego, CA

Data security and digital privacy on the road, what travelers should know

Summer is here and for many families that means travels plans, but do your summer travel plans include taking care of your data and digital devices? Which digital devices do you plan to take on your trip and what sort of data do they contain? Perhaps more importantly: What kind of data can they access? These are important questions to think about because these days your data and devices are targets for thieves of all kinds, at all times, including when you're on vacation. In a moment I will have some tips on thwarting the bad guys, but first, think about this: What would happen if someone stole your smartphone or that company laptop you thought you needed to take along on the family sightseeing trip?Quite frankly, if you could get hold of my iPhone and by-pass the security code you could access a lot of personal data about me. If you could also guess my passwords you could get to my bank account. On top of all that you could use my email to fake messages from me and pretend to be me on Facebook and Twitter.

June 14, 2012 | San Diego, CA

The negative impact on GDP of state-sponsored malware like Stuxnet and Flame

The slow drip of revelations about Flame have kept this piece of malware in the news for more than two weeks so it is worth reminding people that most antivirus programs now protect against Flame (ESET products detect it as Win32/Flamer.A). The coverage of Flame was boosted last week by a conveniently-timed assist from leaks that put Stuxnet back in the headlines.Frankly, many antivirus experts were underwhelmed by reports that anonymous officials in the U.

June 7, 2012 | San Diego, CA

Passwords and PINs: the worst choices

At a time when password breaches like the one at LinkedIn are once more making the news, there's plenty of good advice around about how to select a strong password as opposed to the sort of stereotyped easy-to-remember-but-stupendously-easy-to-guess password that turns up again and again in dumped lists of hacked passwords. So if your favourite, much-used password (or something very like it) is in the following list, it might be a good idea to stop reading this now, go to the link on how to select a strong password and use it as a basis for changing all your passwords to something safer (then come back and think about the PINs you use). The list is abstracted from one compiled by Mark Burnett, representing the most-used passwords in a data set of around 6 million:password123456123456781234qwerty12345dragonpussybaseballfootballletmeinmonkey696969abc123mustangmichaelshadowmasterjennifer1111112000jordansupermanharley1234567I've included the top 25 because it amused me to see my own name at number 24. I suspect, though, that has more to do with motorcycles than my own superstar status.

May 29, 2012 | San Diego, CA

Win32/Flamer: the 21st Century Whale

It’s not only the malware ESET calls Win32/Flamer.A which is complex (and certainly dauntingly large).It's understandable that what appears to be a sophisticated threat found in in several regions, some of them particularly politically sensitive, has excited so much interest. However, conflicting conjecture and confusion over the ‘ownership’ of the detection is muddying the waters somewhat.

| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 |