5 threats every company needs to pay attention to

At ESET Laboratories, we are constantly analyzing and studying how cybercriminals propagate their threats all over the world. Day after day, we receive many different kinds of malicious code created for a variety of purposes. Some are aimed at home users, while others are focused on attacking the business world. Looking back at what we have … More 5 threats every company needs to pay attention to

Multi-stage exploit installing trojan

Introduction ESET researchers receive and analyze thousands of new malware samples every day. Earlier this year, one of them caught our attention because it was not an ordinary executable file, but a preference file used by a specific program. Further analysis quickly revealed the file actually is malicious and exploited a vulnerability in the software … More Multi-stage exploit installing trojan

New exploit compromises Samsung Galaxy phones

Potentially 600m Samsung Galaxy phones are at risk of malicious compromise after a new exploit was discovered by a security researcher. The vulnerability is down to the way in which SwiftKey keyboard app updates – it periodically queries a server to check if new updates exist. However, the process is conducted in the clear, and … More New exploit compromises Samsung Galaxy phones

Millions of WordPress sites left vulnerable by plugin flaw

Millions of WordPress sites have been left vulnerable by a scripting flaw found in two popular plugins, one of which is present in the default installation of the blogging platform, reports Computer World. The two plugins are JetPack and Twenty Fifteen, the first of which is a customization and performance tool, and the latter is … More Millions of WordPress sites left vulnerable by plugin flaw