New traces of Hacking Team in the wild

Previously unreported samples of Hacking Team’s infamous surveillance tool – the Remote Control System (RCS) – are in the wild, and have been detected by ESET systems in fourteen countries. Our analysis of the samples reveals evidence suggesting that Hacking Team’s developers themselves are actively continuing the development of this spyware. From Hacking Team to … More New traces of Hacking Team in the wild

One in five healthcare employees willing to sell patient data, study finds

Almost one in five (18%) employees in the healthcare industry in the United States and Canada said that they would be willing to give access to confidential medical data about patients to an unauthorized outsider for financial gain, a survey for Accenture has revealed. They would expect no more than $500 to $1,000 for their login credentials … More One in five healthcare employees willing to sell patient data, study finds

Trends 2018: The ransomware revolution

This is actually where I came in, nearly 30 years ago. The first malware outbreak for which I provided consultancy was Dr. Popp’s extraordinary AIDS Trojan, which rendered a victim’s data inaccessible until a ‘software lease renewal’ payment was made. And for a long time afterwards, there was not much else that could be called ransomware, unless … More Trends 2018: The ransomware revolution

Can you spot a hoax in the flood of news? Can your children?

Gone are the days of chain letters! Back then, all victims of fabricated falsehoods had to lose was time and possibly a few bucks for stamps. Compared to these old-school hoaxes, there’s much more at stake with their modern cousins – often designed well enough to manipulate their audience into doing something without even realizing it. … More Can you spot a hoax in the flood of news? Can your children?

Cryptojacking, the result of “cryptocurrency rush” and how ESET can help

The rise in value of some digital currencies has led to a kind of “cryptocurrency rush” in which the mining is carried out not only by individuals trying to earn money legitimately, but also by cybercriminals who are developing threats and instigating attacks to hijack digital currencies, or otherwise to use computer resources owned by regular internet … More Cryptojacking, the result of “cryptocurrency rush” and how ESET can help