Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-01-07 15:00:23 |
CES 2022: Space security – no more flying blind (lien direct) |
And no more worrying about your satellite being smashed by a “drunk driver” as new tech promises to predict hazards in orbit
|
|
|
|
|
2022-01-06 17:00:27 |
CES 2022: More sensors than people (lien direct) |
A sea of sensors will soon influence almost everything in your world
|
|
|
|
|
2022-01-05 10:30:12 |
5 ways hackers steal passwords (and how to stop them) (lien direct) |
From social engineering to looking over your shoulder, here are some of the most common tricks that bad guys use to steal passwords
|
|
|
|
|
2022-01-04 10:30:49 |
Instagram and teens: A quick guide for parents to keep their kids safe (lien direct) |
How can you help your kids navigate Instagram safely? Here are a few tips to help you protect their privacy on the app.
|
|
|
|
|
2022-01-03 10:30:52 |
Breaking the habit: Top 10 bad cybersecurity habits to shed in 2022 (lien direct) |
Be alert, be proactive and break these 10 bad habits to improve your cyber-hygiene in 2022
|
|
|
|
|
2021-12-30 10:30:16 |
22 cybersecurity statistics to know for 2022 (lien direct) |
As we usher in the New Year, let's take a look at some statistics that will help you stay up-to-date on recent cybersecurity trends
|
|
|
|
|
2021-12-27 10:30:22 |
2021 in review: The biggest cybersecurity stories of the year (lien direct) |
As we close out another year like no other, let's look back at some of the most notable cybersecurity stories that shaped 2021
|
|
|
|
|
2021-12-22 10:30:00 |
This holiday season, give your children the gift of cybersecurity awareness (lien direct) |
Don't leave your kids to their own devices – give them a head start with staying safe online instead
|
|
|
|
|
2021-12-20 10:30:55 |
Don\'t forget to unplug your devices before you leave for the holidays! (lien direct) |
As you down tools for the holiday season, be sure to also switch off the standby lights – it's both cost effective and better for the environment
|
|
|
|
|
2021-12-15 18:18:07 |
What every business leader needs to know about Log4Shell (lien direct) |
Hundreds of thousands of attempts to exploit the vulnerability are under way
|
Vulnerability
|
|
|
|
2021-12-15 10:30:06 |
The dirty dozen of Latin America: From Amavaldo to Zumanek (lien direct) |
The grand finale of our series dedicated to demystifying Latin American banking trojans
|
|
|
|
|
2021-12-14 10:30:24 |
5 warning signs your identity has been stolen (lien direct) |
By spotting these early warning signs of identity theft, you can minimize the impact on you and your family
|
|
|
|
|
2021-12-13 20:02:18 |
Log4Shell vulnerability: What we know so far (lien direct) |
The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here's what we know so far
|
|
|
|
|
2021-12-09 10:30:33 |
SnapHack: Watch out for those who can hack into anyone\'s Snapchat! (lien direct) |
Oh snap! This is how easy it may be for somebody to hijack your Snapchat account – all they need to do is peer over your shoulder.
|
Hack
|
|
|
|
2021-12-07 10:30:30 |
5 common gift card scams and how to spot them (lien direct) |
It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season
|
Threat
|
|
|
|
2021-12-06 10:30:53 |
What are buffer overflow attacks and how are they thwarted? (lien direct) |
Ever since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities
|
|
|
|
|
2021-12-03 16:07:38 |
Scammers exploit Omicron fears in new COVID‑19 phishing campaign (lien direct) |
Fraudsters take advantage of the emergence of the new variant to dupe unsuspecting victims out of their sensitive data
|
|
|
|
|
2021-12-02 10:30:49 |
Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries (lien direct) |
Press play for the first episode as host Aryeh Goretsky is joined by Zuzana Hromcová to discuss native IIS malware
|
Malware
|
|
|
|
2021-12-01 10:30:48 |
Jumping the air gap: 15 years of nation‑state effort (lien direct) |
ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs
|
|
|
|
|
2021-11-29 17:04:26 |
More than 1,000 arrested in global crackdown on online fraud (lien direct) |
The INTERPOL-led operation involved law enforcement from 20 countries and led to the seizure of millions of dollars in illicit gains
|
|
|
|
|
2021-11-25 10:30:16 |
The triangle of holiday shopping: Scams, social media and supply chain woes (lien direct) |
'Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products
|
|
|
|
|
2021-11-24 10:30:23 |
Avoiding the shopping blues: How to shop online safely this holiday season (lien direct) |
With the holiday shopping bonanza right around the corner, here's how to make sure your online spending spree is hacker-free
|
|
|
|
|
2021-11-23 20:08:16 |
FBI, CISA urge organizations to be on guard for attacks during holidays (lien direct) |
Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends
|
Ransomware
|
|
|
|
2021-11-22 10:30:27 |
What to do if you receive a data breach notice (lien direct) |
Receiving a breach notification doesn't mean you're doomed – here's what you should consider doing in the hours and days after learning that your personal data has been exposed
|
Data Breach
|
|
|
|
2021-11-19 14:00:00 |
CYBERWARCON – Foreign influence operations grow up (lien direct) |
Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks.
|
Threat
|
|
|
|
2021-11-18 16:00:54 |
US Government declassifies data to foster would‑be defenders (lien direct) |
US Government declassifies cybersecurity subjects they want you to learn about, and is hoping to pay you to learn them
|
|
|
|
|
2021-11-18 10:30:39 |
\'My bank account was in a shambles\': The ordeal of an identity theft victim (lien direct) |
A victim of identity theft tells us how criminals used his identity to commit fraud and what it took to put his life back in order
|
|
|
|
|
2021-11-16 15:34:40 |
Strategic web compromises in the Middle East with a pinch of Candiru (lien direct) |
ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high‑profile websites in the Middle East
|
|
|
|
|
2021-11-15 18:10:44 |
FBI systems compromised to send out fake attack alerts (lien direct) |
Hackers break into the Bureau's email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks
|
|
|
|
|
2021-11-11 10:45:24 |
When the alarms go off: 10 key steps to take after a data breach (lien direct) |
It's often said that data breaches are no longer a matter of 'if', but 'when' – here's what your organization should do, and avoid doing, in the case of a security breach
|
|
|
|
|
2021-11-10 17:24:39 |
Google scores big win as court blocks iPhone tracking lawsuit (lien direct) |
The tech giant wins an appeal against a claim that it unlawfully collected personal data of millions of iPhone users
|
|
|
|
|
2021-11-09 19:02:14 |
Robinhood data breach affects 7 million people (lien direct) |
An attacker gained access to some of Robinhood's customer support systems and stole the personal data of around a third of the app's userbase
|
Data Breach
|
|
|
|
2021-11-08 10:30:13 |
Passwordless authentication: Is your company ready to move beyond passwords? (lien direct) |
Are the days numbered for '123456'? As Microsoft further nudges the world away from passwords, here's what your organization should consider before going password-free.
|
|
|
|
|
2021-11-04 16:22:55 |
Google squashes Android zero‑day bug exploited in targeted attacks (lien direct) |
Beyond the vulnerability in the Android kernel, the monthly round of security patches plugs another 38 security loopholes
|
Vulnerability
|
|
|
|
2021-11-03 14:00:59 |
Win one for privacy – Swiss providers don\'t have to talk (lien direct) |
Security and privacy get a leg up in Proton's legal challenge against data retention and disclosure obligations
|
|
|
|
|
2021-11-03 10:30:54 |
What\'s it like to work as a malware researcher? 10 questions answered (lien direct) |
Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field
|
Malware
|
|
|
|
2021-11-02 16:01:51 |
Man charged with hacking major US sports leagues to illegally stream games (lien direct) |
On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000
|
|
|
|
|
2021-10-28 09:30:54 |
5 tips for parents for a cybersecure Halloween (lien direct) |
What are some of the key dangers faced by children online and how can you help protect them from the ghosts, ghouls and goblins creeping on the internet?
|
|
|
|
|
2021-10-27 14:44:49 |
Dark HunTOR: 150 arrested, $31 million seized in major dark web bust (lien direct) |
The police sting spanned three continents and involved crackdowns in nine countries
|
|
|
|
|
2021-10-27 09:30:06 |
Wslink: Unique and undocumented malicious loader that runs as a server (lien direct) |
There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor
|
Tool
Threat
|
|
|
|
2021-10-26 09:30:48 |
Putting cybersecurity first: Why secure‑by‑design must be the norm (lien direct) |
Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom
|
|
|
|
|
2021-10-22 09:30:10 |
What\'s lurking in the shadows? How to manage the security risks of shadow IT (lien direct) |
Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era
|
|
|
|
|
2021-10-21 09:30:27 |
Cybersecurity careers: What to know and how to get started (lien direct) |
Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track.
|
|
|
|
|
2021-10-20 20:32:20 |
Brave browser replaces Google with its own search engine (lien direct) |
Brave Search will become the default search option for new users in the US, UK, Canada, Germany and France, with more countries to follow soon
|
|
|
|
|
2021-10-19 18:23:09 |
$5.2 billion worth of Bitcoin transactions possibly tied to ransomware (lien direct) |
Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds
|
Ransomware
|
|
|
|
2021-10-19 09:30:54 |
A recipe for failure: Predictably poor passwords (lien direct) |
Security professionals advise to never use 'beef stew' as a password. It just isn't stroganoff.
|
|
|
|
|
2021-10-15 09:30:19 |
Virus Bulletin: Old malware never dies – it just gets more targeted (lien direct) |
Putting a precision payload on top of more generic malware makes perfect sense for malware operators
|
Malware
|
|
|
|
2021-10-14 09:30:14 |
Employee offboarding: Why companies must close a crucial gap in their security strategy (lien direct) |
There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?
|
|
|
|
|
2021-10-13 09:30:48 |
Don\'t get phished! How to be the one that got away (lien direct) |
If it looks like a duck, swims like a duck, and quacks like a duck, then it's probably a duck. Now, how do you apply the duck test to defense against phishing?
|
|
|
|
|
2021-10-12 16:41:38 |
Microsoft thwarts record‑breaking DDoS attack (lien direct) |
The attack, which clocked in at 2.4 Tbps, targeted one of Azure customers based in Europe
|
|
|
|