eboxlab@gmail.com

About eboxlab@gmail.com

This author has not yet filled in any details.
So far eboxlab@gmail.com has created 411 blog entries.

The worst passwords of 2020: Is it time to change yours?

2020-11-19T14:11:04+00:00

They’re supremely easy to remember, as well as easy to crack. Here’s how to improve your password security. Cybersecurity experts often share advice about the do’s and don’ts of passwords as a vital part of good cyber-hygiene practices. And yet, annual roundups of the most common passwords show that many of us continue to prioritize [...]

The worst passwords of 2020: Is it time to change yours?2020-11-19T14:11:04+00:00

Bumble bugs could have exposed personal data of all users

2020-11-18T17:43:44+00:00

The information at risk of theft due to API flaws included people’s pictures, locations, dating preferences and Facebook data Security vulnerabilities in Bumble, one of today’s most popular dating apps, could have exposed the personal information of its entire, almost 100 million-strong user-base. The bugs – which affected Bumble’s application programming interface (API) and stemmed [...]

Bumble bugs could have exposed personal data of all users2020-11-18T17:43:44+00:00

Lazarus supply‑chain attack in South Korea

2020-11-16T10:30:03+00:00

ESET researchers uncover a novel Lazarus supply-chain attack leveraging WIZVERA VeraPort software ESET telemetry data recently led our researchers to discover attempts to deploy Lazarus malware via a supply-chain attack in South Korea. In order to deliver its malware, the attackers used an unusual supply-chain mechanism, abusing legitimate South Korean security software and digital certificates [...]

Lazarus supply‑chain attack in South Korea2020-11-16T10:30:03+00:00

Cybersecurity careers: Which one is right for you?

2020-11-13T10:30:09+00:00

Looking for vulnerabilities, securing systems or dismantling them, these are all viable career paths in the cybersecurity industry. Could one of them be right for you? The abundance of cyberthreats and shortage of skilled professionals, as well as competitive salaries and interesting job descriptions, are some of the reasons why a career in cybersecurity remains [...]

Cybersecurity careers: Which one is right for you?2020-11-13T10:30:09+00:00

Microsoft Teams flaw could let attackers hijack accounts

2020-04-27T16:55:34+00:00

Microsoft plugs a security hole that could have enabled attackers to weaponize a GIF in order to hijack Teams accounts and steal data Microsoft has fixed a security flaw in Microsoft Teams that, if left unattended, could have been exploited to take over user accounts. By hijacking a Teams account, the bad actors might eventually [...]

Microsoft Teams flaw could let attackers hijack accounts2020-04-27T16:55:34+00:00

iOS Mail app flaws may have left iPhone users vulnerable for years

2020-04-23T17:54:22+00:00

A pair of vulnerabilities in the default email app on iOS devices is believed to have been exploited against high-profile targets Apple’s iOS Mail app, which comes pre-installed on all iOS devices, has been found to contain two severe security vulnerabilities that, if exploited, could enable hackers to steal the victims’ data. In fact, the [...]

iOS Mail app flaws may have left iPhone users vulnerable for years2020-04-23T17:54:22+00:00

Following ESET’s discovery, a Monero mining botnet is disrupted

2020-04-23T09:30:57+00:00

ESET researchers discover, and play a key role in the disruption of, a 35,000-strong botnet spreading in Latin America via infected USB drives ESET researchers recently discovered a previously undocumented botnet that we have named VictoryGate. It has been active since at least May 2019 and, since then, three different variants of the initial module [...]

Following ESET’s discovery, a Monero mining botnet is disrupted2020-04-23T09:30:57+00:00

Buying a secondhand device? Here’s what to keep in mind

2020-04-22T09:30:34+00:00

If you’re trying to be responsible towards the planet, also be responsible to yourself and take these steps so that the device doesn’t end up costing you more than you’ve saved According to a report released by the World Economic Forum, the world produced an estimated 50 million tons of electronic waste in 2018. This figure is [...]

Buying a secondhand device? Here’s what to keep in mind2020-04-22T09:30:34+00:00

Serious flaws found in multiple smart home hubs: Is your device among them?

2020-04-22T07:30:01+00:00

In worst-case scenarios, some vulnerabilities could even allow attackers to take control over the central units and all peripheral devices connected to them ESET IoT Research has found numerous serious security vulnerabilities in three different home hubs – Fibaro Home Center Lite, Homematic Central Control Unit (CCU2) and eLAN-RF-003. These devices are used to monitor [...]

Serious flaws found in multiple smart home hubs: Is your device among them?2020-04-22T07:30:01+00:00

How gamification can boost your cybersecurity training

2020-04-21T09:30:44+00:00

Security is not a game, but learning about it could be – here’s why adding the fun factor can help employees become more cyber-aware Since 2017, each April 21st we mark World Creativity and Innovation Day. It’s a day dedicated to celebrating creative and innovative thinking, but it doesn’t mean it has to be limited to [...]

How gamification can boost your cybersecurity training2020-04-21T09:30:44+00:00
Go to Top