The giveaway scheme uses the tech titan’s name as part of Bitcoin addresses for extra credibility Cryptocurrency giveaway scams – including those impersonating Tesla and SpaceX boss Elon Musk – have been making the rounds for quite a few years now. The newest trick up the fraudsters’ sleeves involves name-dropping Musk into the Bitcoin address [...]
About email@example.comThis author has not yet filled in any details.
So far firstname.lastname@example.org has created 452 blog entries.
Cyberbullying can happen to anyone, at any time – and at any age. How can adults deal with various forms of online abuse and harassment? Whenever cyberbullying is mentioned, our minds usually associate the topic with children or teenagers. Much has been said about cyberbullying by psychologists, organizations, public figures, as well as other concerned [...]
ESET researchers reveal the modus operandi of the elusive InvisiMole group, including newly discovered ties with the Gamaredon group In our tracking of the InvisiMole group, which we rediscovered and first reported on in 2018, we have found a new campaign targeting high-profile organizations in Eastern Europe. Investigating the attacks, in close cooperation with the [...]
Devices used in the energy, transportation and communications sectors are also affected by the flaws in the TCP/IP software library Hundreds of millions of connected devices may be vulnerable to remote attacks due to a series of 19 vulnerabilities in a popular TCP/IP software library developed by a software company called Treck. Collectively dubbed Ripple20, [...]
ESET researchers uncover targeted attacks against high-profile aerospace and military companies At the end of last year, we discovered targeted attacks against aerospace and military companies in Europe and the Middle East, active from September to December 2019. A collaborative investigation with two of the affected European companies allowed us to gain insight into the [...]
The unsolicited phone calls tout everything from miracle cures to financial relief – here’s how you can stay safe The public concern and confusion surrounding the COVID-19 pandemic have offered an array of opportunities for con artists, who have pulled every trick from their books to cash in on people – including by dint of robocalls. [...]
The owners of the vulnerable indoor cameras are advised to unplug the devices immediately Around 3.5 million security cameras installed in homes and offices mainly in Asia and Europe have serious vulnerabilities that expose the gadgets’ owners to the risk that attackers will spy on them, steal their data or target other devices on the [...]
Watch out for attacks attempting to take advantage of the lockdown-induced surge in mobile banking use As the use of mobile banking apps surges during COVID-19 lockdowns, so does the risk that these platforms will be exploited by cybercriminals, warns the FBI’s Internet Crime Complaint Center (IC3). Citing estimates by US financial technology providers, the Bureau’s online [...]
Active APT group adds cunning remote template injectors for Word and Excel documents; unique Outlook mass-mailing macro ESET researchers have discovered several previously undocumented post-compromise tools used by the highly active Gamaredon threat group in various malicious campaigns. One tool, a VBA macro targeting Microsoft Outlook, uses the target’s email account to send spearphishing emails [...]
An obscure Indian company operated a scheme targeting non-profits, banks, politicians and journalists all over the world, a report says A hack-for-hire group targeted thousands of people and hundreds of organizations across six continents for several years, according to a report by Citizen Lab. The internet watchdog, based at the University at Toronto, tied the [...]