Employees’ cybersecurity habits worsen, survey finds

Almost all young people recycle their passwords, often doing so across work and personal accounts. The prevalence of cybersecurity incidents and the concomitant growing concerns about any organization’s cybersecurity posture haven’t done much to discourage many employees from engaging in poor security habits, a survey has found. In some respects, employees’ cyber-hygiene is actually getting … More Employees’ cybersecurity habits worsen, survey finds

Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites

The campaign’s goals aren’t immediately clear, as the malefactors don’t appear to be leveraging the hijacked websites for further nefarious purposes. Attackers have been exploiting a security weakness in a GDPR compliance plugin for WordPress to seize control of vulnerable websites, according to a blog post by Defiant, which makes Wordfence security plugins for the web … More Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites

Google’s data charts path to avoiding malware on Android

How much higher are the odds that your device will be exposed to malware if you download apps from outside Google Play or if you use one of Android’s older versions? Google has the numbers. You need to stick to Google Play for apps and run as recent a version of Android as possible if … More Google’s data charts path to avoiding malware on Android

Emotet launches major new spam campaign

The recent spike in Emotet activity shows that it remains an active threat. A week after adding a new email content harvesting module, and following a period of low activity, the malicious actors behind Emotet have launched a new, large-scale spam campaign. What is Emotet? Emotet is a banking Trojan family notorious for its modular architecture, … More Emotet launches major new spam campaign

Supply-chain attack on cryptocurrency exchange gate.io

Latest ESET research shows just how far attackers will go in order to steal bitcoin from customers of one specific virtual currency exchange. On November 3, attackers successfully breached StatCounter, a leading web analytics platform. This service is used by many webmasters to gather statistics on their visitors – a service very similar to Google … More Supply-chain attack on cryptocurrency exchange gate.io

Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm

This installment in our series of articles to mark Antimalware Day tells the stories behind two creations that are representative of the 1980s: a virus viewed as the first-ever PC virus and a worm that caused the greatest damage ever wrought by a piece of malware up to that point. As promised on Friday when we … More Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm