latest posts

Top Cyber Security Awareness Month themes, topics, and resources

National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).

‘Find My Mobile’ system can be used to attack Samsung handsets

One of the most popular and useful security functions of mobile handsets can be turned against the owner.

White House hit by “sustained” cyber attack, hackers breach unclassified network

IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?

Google outlines new security features in Android 5.0

Google has outlined the enhanced security credentials of the upcoming Android 5.0 – nicknamed Lollipop – in an official blog post.

AVAR Down Under – Security Researchers at Work

ESET will be well represented in papers presented at the AVAR conference in November, but that’s not the only interesting content on the agenda.

British job centers to introduce biometric recognition

Job centers across the United Kingdom are due to get a technological makeover, courtesy of biometric and signature recognition pads, reports IT Pro Portal.

Fidelity National Financial warns of data leak after phishing attack

Fidelity National Financial has been contacting an “undisclosed number of individuals”, notifying them that a selection of personal data may have been exposed after some of the Fortune 500 company’s employees had their email accounts targeted by a phishing campaign, SC Magazine reports.

How do open source tools stay secure?

Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,

42% of Americans hit by regular online attacks, says Microsoft survey

A study by Microsoft has revealed that 42 percent of Americans face ‘weekly or daily’ attacks by cybercriminals trying to access their computers, Network World reports.

Tor users targeted with exit node malware

An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this “would not prevent copycat attackers from the more than 100 exit nodes in operation.”

Internet trolls – how to deal with online abuse

Most internet users have faced some kind of problems with internet trolls – and a new study has thrown light on who they are. We discuss how best to deal with the online pests.

New Tor routers seeking crowdfunding appear as Anonabox is pulled by Kickstarter

A selection of rival privacy conscious Tor routers have appeared on crowdfunding sites after the Anonabox was surprisingly pulled just days after smashing its modest funding targets.

Twitter: “We’re finally getting rid of the password”

Popular microblogging platform Twitter is taking bold steps to try and put an end to the password as we know it, according to Sky News.

Could hackers give you a heart attack or drugs overdose? US authorities investigate

There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.

Ready, set, shop: 10 top tips for a safe shopping season

Tips for safe holiday shopping: whether you shop online or at the mall, there are some simple strategies that can protect your bank accounts and payment cards against criminal hackers and scammers.

Counter surveillance tech – can gadgets spy-proof your life?

Over the past few years, counter surveillance gadgets which might have been the preserve of secretive government departments a decade ago have suddenly hit mainstream shops – from Mission Impossible-stlye self-destructing drives to some rather eerie counter-surveillance masks.

Top 5 Scariest Zombie Botnets

An army of the undead, wreaking havoc on the Internet – it’s a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

Shopping safely with Amazon

Online shopping can be risky even if you use world renowned websites such as Amazon. Take a look at our top tips for how to shop safely with the online store.

How to speed up your computer

A slow computer can be both frustrating and time consuming, so we’ve provided a few basic tips to help give your computer its speed back.

Yahoo, Match and AOL hit by ransomware

Cybercriminals taking advantage of a ‘malvertising’ attack on big name sites including Yahoo!, Match.com and AOL were making in the region of $25,000 per day, according to Forbes.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Stephen Cobb

Graham Cluley

David Harley

Cameron Camp

Lysa Myers

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.