ESET researchers have discovered a new operation within a long-running cyber-espionage campaign in the Middle East, apparently with links to the threat actor group known as Gaza Hackers, or Molerats. Instrumental in the operation is an Android app, Welcome Chat, which serves as spyware while also delivering the promised chatting functionality. The malicious website promoting … More ESET discovers a chat app spying on users and leaking stolen data
In ongoing consultations with clients, large companies named targeted attacks and hacking as two of their biggest security challenges since they can seriously impact the continuity of business activities in an organization. Attackers have many means to infiltrate companies. However, many attacks, don’t require a very high level of technological sophistication. Instead, techniques like targeted social … More Hacking and targeted cyber-attacks as a result of anti-competitive practices in business
What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial … More Face scanning – privacy concern or identity protection?
ESET researchers discover a new Android ransomware family that attempts to spread to victims’ contacts and deploys some unusual tricks. NOTE: Users with ESET Mobile Security receive a warning about the malicious link; should they ignore the warning and download the app, the security solution will block it. After two years of decline in Android … More New ransomware attacking Android mobiles by tricking Reddit users
One of the most prevalent forms of cyber-attacks, phishing takes the form of an email or a text message designed to trick us into giving up our personal information. A phishing email may be disguised to look as though it comes from a financial institution such as a bank. The aim of the email … More What is Phishing and why is it a problem?