Please turn on your JavaScript for this page to function normally.
Malware directs stolen documents to Google Drive

Researchers have uncovered a new type of information-stealing malware that is apparently used in campaigns targeting government agencies and can syphon files from compromised …

2FA: Google offers physical alternative to verification codes

Google is offering an alternative second factor for its two-step account verification option, one that has the additional advantage of thwarting phishing attacks. It’s …

OS X Yosemite’s Spotlight Suggestions: Privacy killer or not?

With last week’s official release of OS X Yosemite (v10.10), Apple has solved some critical security issues that could adversely affect users. But the new version of the …

Staples customers likely the latest victims of credit card breach

International office supply chain store Staples is likely the latest retailer to have suffered a credit card breach. “Multiple banks say they have identified a pattern …

Cloud adoption trends in European organizations

In Europe, the number of cloud services in use by the average company increased 23 percent, rising from 588 in Q1 to 724 in Q3. However, not all of these services are ready …

Delivering malicious Android apps hidden in image files

Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, …

Small healthcare facilities unprepared for a data breach

While healthcare breaches are on the rise, most small facilities feel that their systems adequately limit the risk of a data breach despite one in three facilities spending …

China executes MITM attack against iCloud and Microsoft account holders

China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked and all the information in them slurped up by the Chinese authorities, web …

Hackers make companies’ phones call premium-rate numbers, cost them billions

Attackers hacking into companies’ phone network, using it to place mass phone calls to premium-rate telephone numbers is not a new occurrence – they have been …

OS X Yosemite comes with POODLE and Shellshock patches

Last week Apple released a new version of its operating system to consumers. What’s interesting to note is that OS X 10.10 (aka “Yosemite”) also came with a …

Facebook trawls through paste sites for compromised credentials

In the spirit of November as National Cyber Security Awareness Month, Facebook security engineer Chris Long shared how the company discovers that some of its users’ …

Infographic: A brief history of malware

From simple disk-to-disk attacks in the 80s to email viruses in the modern day, malware is here to stay. This ESET infographic offers you insight about the origins and …

Don't miss

Cybersecurity news