May 2, 2016 | ESET Protection Products + News, Malware and Exploits
“The USB Thief is, in many aspects different from the more common malware types that we’re used to seeing flooding the internet,” Mr. Gardoň notes. “This one uses only USB devices for propagation, and it does not leave any evidence on the compromised computer. Its...
May 2, 2016 | General Security
The US Supreme Court has just amended a procedural rule, known as Rule 41, that would allow judges to issue warrants for the government to hack computers anywhere, even outside their jurisdictions or if those computers belong to innocent victims of criminal hacking....
May 1, 2016 | General Security
Oracle, the maker of the Java computer programming language has asked ESET is publishing this information. The reason Oracle made the request because it was ordered to do so by the US Federal Trade Commission (FTC). That’s correct, the US government can (and has)...
Apr 25, 2016 | Cyber-Crime, Malware and Exploits
(Reuters) The cyber-attackers who stole approximate $81 million from the Bangladesh central bank probably hacked into software from the SWIFT financial platform that is at the heart of the global financial system, said security researchers at British defense...
Apr 24, 2016 | General Security, Malware and Exploits
An outdated computer is an infection waiting to happen. This isn’t our opinion, it’s a widely known fact in information security. There are patches released regularly by your software providers, and more than 80% of those patches or upgrades are to fix...