Ransomware threat highlights why backing up data is essential

Noticeably, over the last two years, there has been a marked increase in ransomware attacks, which is, in its simplest form, a type of malware that is executed for the principal reason of extortion. The malicious software, once deployed, encrypts data, as well as devices. Access is only achievable if the victim pays a ransom … More Ransomware threat highlights why backing up data is essential

Banks ‘should not compensate’ victims of online fraud

UK Metropolitan police commissioner Sir Bernard Hogan-Howe has advised banks not to offer compensation to victims of online fraud, arguing that the increased risk will encourage people to better protect themselves against cybercrime. Speaking in an interview with The Times, Mr. Hogan-Howe suggested that by removing the safety blanket of compensation, internet users would think … More Banks ‘should not compensate’ victims of online fraud

Meet Remaiten – a Linux bot on steroids targeting routers and potentially other IoT devices

ESET researchers are actively monitoring malware that targets embedded systems such as routers, gateways and wireless access points. Recently, we discovered a bot that combines the capabilities of Tsunami (also known as Kaiten) and Gafgyt. It also provides some improvements as well as a couple of new features. We call this new threat Linux/Remaiten. So far, … More Meet Remaiten – a Linux bot on steroids targeting routers and potentially other IoT devices

Hacking wireless mice: If it controls something, it can be abused

A cybersecurity company called Bastille, from San Francisco has been doing some experimenting with hacking wireless mice and uncovered a flaw they say leaves millions of networks and billions of computers vulnerable to attack. It turns out that wireless mice from companies like HP, Lenovo, Amazon and Dell use unencrypted signals to communicate with computers. … More Hacking wireless mice: If it controls something, it can be abused