Solicitation I Just Got Offering Yelp Reviews For Sale Before you get too excited, I'm not ever going to tell you to buy reviews. It's stupid, dangerous, and has the very likely potential to get your account labeled as fraudulent. I'm not even just making assumptions. We tested it by creating "new businesses" (that didn't…
1. What kind of sick world would we be living in if Yelp didn't have an update function? 2. False advertising gets this joint one star 3. Hey, two stars not bad, considering... (I had to) 4. This guy cleaned up at the HLAs last year (Hate Life Awards) 5. Even when they're good, they're…
What are some common ploys targeting PayPal users? Here’s what you should watch out for when using the popular payment service. PayPal is one of the key players in the field of online payment providers, operating as a payment processor for popular online marketplaces, auction websites, as well as other commercial sellers. Popular brands such…
While shopping for the perfect presents, be on the lookout for naughty cybercriminals trying to ruin your Christmas cheer by tricking you out of both gifts and money In the words of the famous song, it’s beginning to look a lot like Christmas, and in the run-up to one of the most anticipated holidays of…
A Q&A with security researcher Alejandro Hernández, who has unearthed a long list of vulnerabilities in leading trading platforms that may expose their users to a host of security and privacy risks Much ink has been spilled on how the COVID-19 pandemic has shut down or disrupted many aspects of our lives. To some extent,…
ESET experts look back at some of the key themes that defined the cybersecurity landscape in the year that’s ending and give their takes on what to expect in 2021 2020 has been a year like no other in living memory. It will go down in history for many things, but they all pale in…
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds Earlier this year, Apple patched a severe security loophole in an iOS feature that could have allowed attackers to remotely gain complete control over any iPhone within Wi-Fi range. However, details about the flaw, which was…
Santa will soon come down the chimney, but there are potential entry points into your home and digital life that you should never leave open Many of us associate early December with the first snowfall, Holiday preparations and the beginning of Advent. And what better way to celebrate the preparations for the most wonderful time…
The new release patches a total of eight vulnerabilities affecting the desktop versions of the popular browser. Google has rolled out an update last week for its Chrome web browser that fixes a range of security flaws including four that have been classified as highly severe. The vulnerabilities affect the Windows, macOS, and Linux versions…
U.S. tax-payers will be able to enroll in the Identity Protection PIN program that was previously available only to certain users starting mid-January. U.S. tax-payers will be able to enroll in the Identity Protection PIN program that was previously available only to certain users starting mid-January In an effort to battle various flavors of tax fraud and tax-related…
The last Patch Tuesday of the year brings another fresh batch of fixes for Microsoft products and while the number may be lower the patches are no less important. In the last Patch Tuesday of the year Microsoft has rolled out fixes to no fewer than 58 vulnerabilities across more than ten products including Windows and…
LuckyMouse, TA428, HyperBro, Tmanger and ShadowPad linked in Mongolian supply-chain attack ESET researchers discovered that chat software called Able Desktop, part of a business management suite popular in Mongolia and used by 430 government agencies in Mongolia (according to Able), was used to deliver the HyperBro backdoor (commonly used by LuckyMouse), the Korplug RAT (also known as PlugX), and a RAT called Tmanger (which was first documented by NTT Security and was used during Operation Lagtime IT campaigns attributed to TA428 by Proofpoint). A connection with…