Week in security with Tony Anscombe

Share ESET researchers document how cybercriminals abused the advertising network of Russia’s leading search engine for malicious campaigns targeting accountants ESET researchers document how cybercriminals abused the online advertising network of Russia’s leading search engine for malicious campaigns targeting accountants. In another research effort, ESET experts discover security holes in a D-Link internet-connected camera that […]

World Password Day: A day to review your defenses

So, do you think you’ve been ‘pwned’? That’s the question to ask yourself today Today is World Password Day, a day to reflect on just how vulnerable a poor password can leave you. As more and more of the processes and tools we use in our everyday lives shift to the online world, the number […]

How Anubis uses Telegram (and Chinese characters) to phone home

Anubis, the persistent banking Trojan targeting Android phones has continued to abuse social media platform: The malware uses the encrypted messaging service Telegram to retrieve its initial command and control instructions and the address of its C2 server. Anubis has been abusing public services like Twitter for some time to do the same thing, but […]

A taste of the onslaught at the network’s edge

By Andrew Brandt Anyone who runs their own network knows that you just don’t put most machines or devices “on the internet,” but behind a concealment method called a NAT, so the arbitrary connection attempts and scans that originate from all corners of the internet can’t reach those devices. However, some machines do need to […]