ESET researchers are actively monitoring malware that targets embedded systems such as routers, gateways and wireless access points. We call this new threat Linux/Remaiten.
It’s one of the creepiest things you can experience on Facebook. You stumble across the profile of “another” user who appears to have stolen the details of your life – lock, stock and barrel. And they are spreading slurs about your character, and befriending your contacts…
The US Department of Justice (DoJ) has indicted seven people believed to have coordinated cyberattacks on banks between 2011 and 2013, all with links to the Iranian government.
A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware, reports ESET’s Tomáš Gardoň.
ESET has discovered a new USB-based data stealer capable of stealthy attacks against air-gapped systems – it is also well-protected against detection and reverse-engineering.
The FBI has said it may no longer need Apple’s assistance in opening the locked iPhone belonging to an attacker in December’s San Bernardino, California shooting.
As Twitter celebrates its 10th birthday, we take a look at things from a security point of view with our ‘noticeboard’ feature. Here’s to 10, 20, 30 and many more successful years of tweeting.
Ransomware is a very popular type of malicious code present and has a very peculiar operation: hijacks your files and asks for a monetary ransom. So should you pay the cybercriminals?
Highlights from the past seven days in information security include the threat from Locky, the nuisance of Robocalls and another celeb-related iCloud breach.