Find

March 17, 2020

Beware scams exploiting coronavirus fears

Emergencies offer golden opportunities for con artists to launch fraudulent campaigns that feed off, and cash in on, the climate of concern. Against the backdrop of a disease that has so far caused more than 4,000 deaths and continues to spread, scammers have wasted no time in playing on people’s fears or evoking feelings of compassion.
by | 4 min read
March 16, 2020

Flaw in popular VPN service may have exposed customer data

The researcher found that anyone who sent an HTTP POST request without authentication to join.nordvpn.com could see users’ email addresses, payment method and URL, the product they purchased, the amount they paid for it and even the currency used in the transaction.
by | 2 min read
March 10, 2020

Voice assistants can be hacked with ultrasonic waves

A group of US and Chinese researchers conducted a number of experiments, proving that under the right conditions the voice assistants on your smartphone could be fooled into spilling sensitive information or carrying out certain tasks.
by | 2 min read
March 8, 2020

On the front lines against malware with Zuzana Hromcová

Interview with ESET researcher, Zuzana Hromcová What is it like […]
by | 2 min read
February 26, 2020

Plugin flaw leaves up to 200,000 WordPress sites at risk of attack

A popular WordPress theme plugin that’s installed on some 200,000 websites has been found to contain a serious vulnerability that, if abused, could allow remote attackers to wipe the sites and gain admin access to them.
by | 2 min read
February 25, 2020

Electric scooters vulnerable to remote hacks

Many e-scooters rely on a combination of Bluetooth Low Energy (BLE) and the rider’s smartphone internet connection to run, as well as to send data to the service provider. This opens up a number of avenues for potential attacks.
by | 2 min read
February 25, 2020

Sensitive plastic surgery photos exposed online

Researchers at vpnMentor, who uncovered the leak, were able to access some 900,000 individual records. These ranged from before-and-after images and videos of cosmetic procedures to materials of a highly sensitive nature, including graphic photos of the patients’ private body parts. The origin of the records is not clear but it can be assumed that the leak affected NextMotion clients.
by | 2 min read