Delivering malicious Android apps hidden in image files
Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, …
Small healthcare facilities unprepared for a data breach
While healthcare breaches are on the rise, most small facilities feel that their systems adequately limit the risk of a data breach despite one in three facilities spending …
China executes MITM attack against iCloud and Microsoft account holders
China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked and all the information in them slurped up by the Chinese authorities, web …
Hackers make companies’ phones call premium-rate numbers, cost them billions
Attackers hacking into companies’ phone network, using it to place mass phone calls to premium-rate telephone numbers is not a new occurrence – they have been …
OS X Yosemite comes with POODLE and Shellshock patches
Last week Apple released a new version of its operating system to consumers. What’s interesting to note is that OS X 10.10 (aka “Yosemite”) also came with a …
Facebook trawls through paste sites for compromised credentials
In the spirit of November as National Cyber Security Awareness Month, Facebook security engineer Chris Long shared how the company discovers that some of its users’ …
Infographic: A brief history of malware
From simple disk-to-disk attacks in the 80s to email viruses in the modern day, malware is here to stay. This ESET infographic offers you insight about the origins and …
Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild
Here’s an overview of some of last week’s most interesting news and articles: Identifying deceptive behavior in user-generated content In this interview, JT Buser, …
Tor Browser 4.0, Tails 1.2 are out
The Tor Project has released version 4.0 of its popular eponymous browser that allows users to use the Internet anonymously and privately, and to circumvent online censorship …
Beware of Ebola-themed phishing, malware campaigns and hoaxes
US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme. “Phishing emails may contain links that direct …
Targeted attack protection via network topology alteration
When it comes to targeted attacks, attackers are not omniscient. They need to gather information in the early stages to know the target they may gather information from …
EMEA threat landscape: APTs nearly doubled
Malware attacks – especially advanced targeted attacks – have nearly doubled in the EMEA region in the first half of 2014, say the results of the analysis of …
Featured news
Resources
Don't miss
- Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted