ESET researchers discover a trojanized Tor Browser distributed by cybercriminals to steal bitcoins from darknet market buyers. Utilizing a trojanized version of an official Tor Browser package, the cybercriminals behind this campaign have been very successful – so far their pastebin.com accounts have had more than 500,000 views and they were able to steal US$40,000+ … More Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser
ESET Smart Home Research Team uncovers Echo, Kindle versions vulnerable to 2017 Wi-Fi vulnerabilities. In recent years, hundreds of millions of homes have become “smarter” and internet-enabled using one of the popular home assistant devices. Despite the efforts of some vendors to develop these devices with security in mind, ESET Smart Home Research Team discovered … More What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed
Do you know what kind of data your streaming device may be collecting while you binge watch? Steadily, we are adopting more and more technology into our households. Our homes are becoming more interconnected, with IoT (Internet of Things) devices becoming regular parts of our lives. One of the devices that is the centerpiece of … More Streaming devices track viewing habits, study finds
ESET researchers discover a previously unreported cyberespionage platform used in targeted attacks against diplomatic missions and governmental institutions, and privacy-concerned users. ESET researchers have discovered a new espionage platform with a complex architecture, a host of measures to make detection and analysis more difficult and two notable features. First, its GSM plugin uses the AT … More ESET discovers Attor, a spy platform with curious GSM fingerprinting
The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology. When most people think of home security, locks, alarms and big dogs come to mind. Substitute security with privacy, and images of curtains and blinds, or unlisted phone numbers spring to mind. … More Inside consumer perceptions of security and privacy in the connected home
Almost 60% of second-hand hard drives hold leftover data from previous owners, a study shows. Have you ever seen a hacker movie? When the other shoe drops, you can see the black hat scrambling for their computer, tearing out their hard drives and trying to erase them. They may even run neodymium magnets over them … More Are you sure you wiped your hard drive properly?
The humongous collection of extensive personal details about millions of people could be a gold mine for scam artists. Almost every single citizen of Ecuador, a country of some 16.6 million people, is believed to have been affected by a new massive data leak, reads a report from vpnMentor. Two weeks ago, the firm discovered a … More Nearly all of Ecuador’s citizens caught up in data leak