"The Industrialization of Malware: One of 2012's darkest themes persists" by ESET Security Evangelist Stephen Cobb
by Stephen Cobb ESET Security Evangelist
December 30, 2012 at 5:28 pm

For several years now, antivirus researchers have observed increasing efficiency and sophistication in malware development and distribution. At the start of 2012, I began using the term "industrialization of malware" to describe this phenomenon. I also drew a picture of the fictitious enterprise "Malware, Inc." as a means of conveying the transformation that malware has … Read More…

Comments
0

?>
"The Dynamic Duo for Securing your Android: Common Sense and Security Software" by Distinguished Researcher Aryeh Goretsky
by Aryeh Goretsky Distinguished Researcher
September 18, 2012 at 1:46 am

On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet, … Read More…

Comments
0

?>
"Offensive / Proactive tactics, will they really work? Blackhat day 1" by Security Researcher Cameron Camp
by Cameron Camp Security Researcher
August 3, 2012 at 5:08 pm

Blackhat keynote speaker Shawn Henry, the former executive assistant director of the FBI’s Criminal, Cyber, Response and Service Branch, started off the day after opening remarks from Jeff Moss, founder of Blackhat. Moss wondered if now was the time for the cyber-security sector to take a more aggressive/offensive approach. Jeff mentioned working for a former … Read More…

Comments
1

?>
"Cybercrime and the small business: Basic defensive measures" by ESET Security Evangelist Stephen Cobb
by Stephen Cobb ESET Security Evangelist
July 6, 2012 at 12:34 pm

Evidence that criminals are targeting the computer systems of small businesses continues to mount. The Wall Street Journal recently drew attention to the way cybercriminals are sniffing out vulnerable firms. The article highlighted the fact that about 72% of the 855 data breaches world-wide last year that were analyzed in Verizon's Data Breach Investigation Report … Read More…

Comments
4

?>
"Guarding against password reset attacks with pen and paper" by Distinguished Researcher Aryeh Goretsky
by Aryeh Goretsky Distinguished Researcher
June 8, 2012 at 11:36 am

With the recent announcements of password breaches at LinkedIn, and warnings from Google about state-sponsored attacks on Gmail accounts, it seems like a good idea now to review some password security basics.  In this blog post, we’re going to take a look at a rather low-tech solution to a decidedly high-tech problem:  How to guard … Read More…

Comments
7

?>
"Cybercrime, Cyberpolicing, and the Public" by Senior Research Fellow David Harley
by David Harley Senior Research Fellow
February 14, 2012 at 8:42 am

 Here are some further thoughts arising from the ACPO National Cyber Crime Conference held recently in the UK*.

DAC Janet Williams, ACPO’s e-Crime lead, summarized the current initiatives along these lines (apologies if I’ve introduced too many of my own preconceptions):

The UK intends to tackle cybercrime and make this one of the safest places to do … Read More…

Comments
0

?>
"Valentine's Day Scams: For the love of money" by ESET Security Evangelist Stephen Cobb
by Stephen Cobb ESET Security Evangelist
February 7, 2012 at 4:06 pm

Scam artists and cybercriminals are looking to turn romance into profit now that Valentine's Day approaches, possibly taking over your computer in the process. According to ESET researchers in Latin America, we can expect the quest for love to be leveraged as an effective social engineering ploy to enable the bad guys to infect unsuspecting … Read More…

Comments
0

?>
"Anonymous and the Megaupload Aftermath: Hacktivism or Just Plain Ugly?" by  EsetResearch
by EsetResearch
January 20, 2012 at 3:26 pm

Yesterday’s announcement by the US Department of Justice that the operators of file-sharing site Megaupload had been indicted for operating a criminal enterprise that generated over $175 million by trafficking in over half a billion dollars of pirated copyrighted material has sent shockwaves across the Internet.  The accuracy of those figures may be questionable, but … Read More…

Comments
0

?>
"2012 Predictions: More mobile malware and localized attacks" by Education & Research Manager at ESET Latin America Sebastian Bortnik
by Sebastian Bortnik Education & Research Manager at ESET Latin America
December 20, 2011 at 3:28 pm

I want share with you what ESET Latin America’s Research team thinks will be the main trends in malware and cybercrime in 2012. In our office it is usual to produce an analysis of emerging trends in a year-end report and so, in keeping with recent postings by my ESET colleagues, I present a summary … Read More…

Comments
0

?>
"Facebook's Expanded Sharing Makes Security Even More Critical" by ESET Security Evangelist Stephen Cobb
by Stephen Cobb ESET Security Evangelist
September 29, 2011 at 3:27 pm

If you're a dedicated follower of Facebook, last week was a bit of a roller coaster. On Monday, Emil Protalinski at ZDNet reminded you that the stories appearing on Facebook about Lady Gaga being found dead in a hotel room are a “likejacking” scam. Then on Tuesday it was reported that Facebook has "introduced a … Read More…

Comments
2

?>
Share |
Subscribe by Email
To automatically receive new posts via email, enter your email address:

Delivered by FeedBurner

Blog Search
Archives

Switch to our mobile site