2016/02/29

5 threats every company needs to pay attention to | foodonia

At ESET Laboratories, we are constantly analyzing and studying how cybercriminals propagate their threats all over the world. Day after day, we receive many different kinds of malicious code created for a variety of purposes. Some are aimed at home users, while others are focused on attacking the business world. Looking back at what we wrote

The post 5 threats every company needs to pay attention to appeared first on We Live Security.



Brought by: http://foodonia.com

UC Berkeley hit with another cyberattack | foodonia

UC Berkeley has revealed that it was the victim of a major cyberattack, affecting up to 80,000 current and former members of staff and students.

The post UC Berkeley hit with another cyberattack appeared first on We Live Security.



Brought by: http://foodonia.com

The security review: porn clicker trojans at Google Play | foodonia

Highlights from the past seven days in information security include porn clicker trojans at Google Play, digital childhoods and the security/privacy debate.

The post The security review: porn clicker trojans at Google Play appeared first on We Live Security.



Brought by: http://foodonia.com

Razzies for malware: These were the worst performances of the year | foodonia

On Sunday night, for the 88th time, the Academy of Motion Picture Arts and Sciences awarded some of the finest actors, directors and movies with the most prestigious prizes in cinema – the Oscars. But they were preceded by another ceremony, the Razzies. Its organizers gave awards for the exact opposite – for the worst

The post Razzies for malware: These were the worst performances of the year appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/24

Privacy and security ‘war’ must come to an end | foodonia

Cybersecurity experts are joining forces with government officials to try and “end the war between privacy and security”, it has been revealed.

The post Privacy and security ‘war’ must come to an end appeared first on We Live Security.



Brought by: http://foodonia.com

Google Play porn clicker ‘is a truly large-scale campaign’ | foodonia

Google Play porn clicker campaign: A single family of malicious apps masquerading as popular games or apps, designed to bypass Google’s security checks.

The post Google Play porn clicker ‘is a truly large-scale campaign’ appeared first on We Live Security.



Brought by: http://foodonia.com

Porn clicker trojans keep flooding Google Play | foodonia

ESET researchers have found 330 malicious porn clicker trojans on Google Play over the last seven months – and their numbers keep rising.

The post Porn clicker trojans keep flooding Google Play appeared first on We Live Security.



Brought by: http://foodonia.com

Porn clicker trojans at Google Play: An analysis | foodonia

ESET researchers have found a large campaign of malicious porn clicker type apps on Google Play. These trojans belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

The post Porn clicker trojans at Google Play: An analysis appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/23

The industrialization of cybercrime may be upon us | foodonia

We are slowly seeing the industrialization of cybercrime according to an expert. Dr. Adrian Nish, head of cyber threat intelligence at BAE Systems, said that cybercriminals are becoming more “professionalized”.

The post The industrialization of cybercrime may be upon us appeared first on We Live Security.



Brought by: http://foodonia.com

Android porn clicker on Google Play: Appendix | foodonia

Trojan clicker servers Google Play information Package names of trojan clickers found on the infected servers  

The post Android porn clicker on Google Play: Appendix appeared first on We Live Security.



Brought by: http://foodonia.com

Digital childhoods: How different nations bring up their kids | foodonia

Most parents think carefully about when to give their children their first set of house keys, or let them go out to play with no adult supervision. Yet in our digitalized world, the same caution should be exercised in the virtual world, such as on social networks or when giving children their first smart gadgets.

The post Digital childhoods: How different nations bring up their kids appeared first on We Live Security.



Brought by: http://foodonia.com

Four Internet-savvy countries agree: Kids go digital too early | foodonia

Nowadays, the internet and technology have become so important for business, travel and many other everyday tasks that they practically surround us all the time. This is true for the younger generation as well, including even the smallest children, but online surveys by ESET show that a majority of parents in Russia, the United Kingdom,

The post Four Internet-savvy countries agree: Kids go digital too early appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/19

Average cost of cybercrime rises by 200% in just five years | foodonia

Cybercrime is costing the global economy up to $450 billion annually, a new report by Hamilton Place Strategies reveals.

The post Average cost of cybercrime rises by 200% in just five years appeared first on We Live Security.



Brought by: http://foodonia.com

The Four “A”s of Account Management | foodonia

It's said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!

The post The Four “A”s of Account Management appeared first on We Live Security.



Brought by: http://foodonia.com

Apple and ‘exceptional access’ to crypto protection | foodonia

Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.

The post Apple and ‘exceptional access’ to crypto protection appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/18

Healthcare data breaches lead more patients to withhold information from doctors | foodonia

New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the security or privacy of medical records, undermining treatment.

The post Healthcare data breaches lead more patients to withhold information from doctors appeared first on We Live Security.



Brought by: http://foodonia.com

How the threat experts see it … | foodonia

A unique survey among threat experts has revealed that most cyberattacks against a typical IT infrastructure take less than 24 hours to plan and execute, and almost half are successful.

The post How the threat experts see it … appeared first on We Live Security.



Brought by: http://foodonia.com

The rise of Android ransomware | foodonia

Lock-screen types and file-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. ESET has prepared a topical white paper on the growth of this insidious Android malware.

The post The rise of Android ransomware appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/17

Anonymous leaks 18GB worth of data belonging to Turkey’s national police force | foodonia

The hacktivist group Anonymous has released close to 18GB worth of sensitive data from Turkey’s national police database, according to reports.

The post Anonymous leaks 18GB worth of data belonging to Turkey’s national police force appeared first on We Live Security.



Brought by: http://foodonia.com

Major vulnerability found in GNU C Library | foodonia

Security researchers have identified a serious vulnerability in an open-source library of code that is known as GNU C Library (glibc).

The post Major vulnerability found in GNU C Library appeared first on We Live Security.



Brought by: http://foodonia.com

How is cryptography incorporated into PoS terminals? | foodonia

Whenever there is information that needs to be protected, there is a need to use cryptographic solutions. POS applications are no exception explains ESET's Lucas Paus.

The post How is cryptography incorporated into PoS terminals? appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/16

VTech warns users that sensitive information ‘may not be secure’ | foodonia

VTech has relaunched its online service Learning Lodge, but appears to have shirked responsibility regarding future data breaches.

The post VTech warns users that sensitive information ‘may not be secure’ appeared first on We Live Security.



Brought by: http://foodonia.com

How to bypass this LG smartphone’s fingerprint security in just 30 seconds | foodonia

A troubling vulnerability has been uncovered that may make you think twice about ever even temporarily allowing a friend, partner or acquaintance to use your new LG V10 Android smartphone.

The post How to bypass this LG smartphone’s fingerprint security in just 30 seconds appeared first on We Live Security.



Brought by: http://foodonia.com

IT security in EMEA – ESET speaks to 1,700 experts and managers. Read the full report | foodonia

The state of information security in companies in the EMEA region, and the attitudes of their IT experts and managers, by ESET.

The post IT security in EMEA – ESET speaks to 1,700 experts and managers. Read the full report appeared first on We Live Security.



Brought by: http://foodonia.com

Biggest fears of EMEA companies? Malware ranks first | foodonia

The most pressing IT security issue that companies in the EMEA region face is malware infection, reports Ondrej Kubovič. Enterprises are very worried.

The post Biggest fears of EMEA companies? Malware ranks first appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/15

Support scams: What do I do now? | foodonia

ESET's David Harley returns to the theme of what to do if a scammer actually gets a foothold on your system because he still sees a number of blog comments from people worried about the implications of such an intrusion.

The post Support scams: What do I do now? appeared first on We Live Security.



Brought by: http://foodonia.com

US hospital hit with ’random’ ransomware attack | foodonia

A hospital in the US is still unable to fully access it computer system, over a week after cybercriminals launched a ransomware attack.

The post US hospital hit with ’random’ ransomware attack appeared first on We Live Security.



Brought by: http://foodonia.com

The security review: Remtasu and Facebook cheat sheet | foodonia

From an outbreak of malicious spyware to the UK’s bill on investigatory powers, here’s our comprehensive breakdown of cybersecurity news from the past week.

The post The security review: Remtasu and Facebook cheat sheet appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/12

How malware moved the exchange rate in Russia | foodonia

After an investigation period, details were published about a unique cyberattack on a Russian bank where a malware placed trade orders for $500 million and heavily manipulated the ruble-dollar exchange rate.

The post How malware moved the exchange rate in Russia appeared first on We Live Security.



Brought by: http://foodonia.com

Calls from the UK to make ‘malicious data breaches’ a criminal offence | foodonia

The UK government should make ‘malicious data breaches’ a criminal offence, according to a new report from the Science and Technology Committee.

The post Calls from the UK to make ‘malicious data breaches’ a criminal offence appeared first on We Live Security.



Brought by: http://foodonia.com

Prince Charming: The Valentine’s Day scammer | foodonia

In this feature, we highlight some of the key tactics used by cybercriminals via online dating websites, helping you stay safe on Valentine's Day.

The post Prince Charming: The Valentine’s Day scammer appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/09

Cybersecurity e-learning course launches in the UK for HR staff | foodonia

A new e-learning tool has been launched in the UK to help HR professionals effectively deal with cybersecurity issues in the British workplace.

The post Cybersecurity e-learning course launches in the UK for HR staff appeared first on We Live Security.



Brought by: http://foodonia.com

Southwest Airlines flight giveaway scams spread on Facebook | foodonia

There is no such thing as a free lunch, and even if there was... who likes airline food that much anyway?

The post Southwest Airlines flight giveaway scams spread on Facebook appeared first on We Live Security.



Brought by: http://foodonia.com

Stay safe with our Facebook cheat sheet | foodonia

Learn how to boost your Facebook privacy on Safer Internet Day with our excellent cheat sheet. It'll work to your advantage now and in the future.

The post Stay safe with our Facebook cheat sheet appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/08

Student arrested for grade changing school data breach | foodonia

A 17-year-old student in American has been arrested and charged with illegally accessing government computers, months after the data breach took place.

The post Student arrested for grade changing school data breach appeared first on We Live Security.



Brought by: http://foodonia.com

Remtasu is disguising itself as a tool to appropriate Facebook accounts | foodonia

Almost a year ago we warned about the spreading of Remtasu, and far from lessening, we have been able to identify numerous instances of this threat being propagated further.

The post Remtasu is disguising itself as a tool to appropriate Facebook accounts appeared first on We Live Security.



Brought by: http://foodonia.com

The security review: Encryption 101 and Android security updates | foodonia

Highlights from the past seven days in information security include encryption insights, Android updates, Facebook at 12 and a data breach at UCF in the US.

The post The security review: Encryption 101 and Android security updates appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/04

New security measures to protect EU data flows to the US | foodonia

The European Commission and the US have agreed on a landmark new deal that will seek to boost the security of ‘transatlantic data flows’, it has been revealed

The post New security measures to protect EU data flows to the US appeared first on We Live Security.



Brought by: http://foodonia.com

Encryption 101: What is it? When should I use it? | foodonia

More than perhaps any other security topic, encryption really seems to perplex a lot of people. So, let's take a closer look – from basics to best practice.

The post Encryption 101: What is it? When should I use it? appeared first on We Live Security.



Brought by: http://foodonia.com

Facebook at 12: Bigger, better and securer | foodonia

In recognition of Facebook’s 12th birthday and its 1.2 billion active users who still enjoy using it, a timely guide on how to keep your account secure.

The post Facebook at 12: Bigger, better and securer appeared first on We Live Security.



Brought by: http://foodonia.com

2016/02/03

European firms’ financial departments the target of cyberattacks | foodonia

Two major cyberattacks have siphoned over $50 million and nearly $80 million from a Belgian bank and an Austrian aircraft parts manufacturer, respectively. They were both victim to a scam known as Business Email Compromise.

The post European firms’ financial departments the target of cyberattacks appeared first on We Live Security.



Brought by: http://foodonia.com