latest posts

4 top security tips for parents

This introductory guide to online safety offers parents some useful security tips on how to protect their children.

Amazon ‘resets customer passwords’ as Black Friday approaches

Amazon has reportedly reset a number of customer passwords, causing some concern as Black Friday and Cyber Monday are just around the corner.

New Dridex campaign achieves high infection ratio in European countries

When discussing banking trojans these days, Dridex is the one that everybody seems to be talking about the most. This trojan has inherited the popularity of the ancient Zeus trojan and is one of the biggest threats that we can find right now, in constant evolution to become more efficient.

You are 6 security steps away from Black Friday brilliance

Black Friday and Cyber Monday promise to offer some fantastic deals at low prices. But it’s also a time of year when cybercriminal scams are aplenty. Here’s what you should do to do to shop safely.

Dell root certificate vulnerability leaves users open to attack

Dell has confirmed that a root certificate vulnerability that is present on some of its laptops and computers, means they can be exploited by cybercriminals.

UK Cyber Security Academy will boost cyberattack resilience

The newly launched Cyber Security Academy in the UK will deliver comprehensive solutions and insight to all types of sophisticated cyberattacks.

Is biometrics the future of secure payments?

Is the idea of biometrics as a secure payment system a fad, fiction or fact? This feature looks at whether DNA is linked with our digital identity.

The security review: Virtualization, diversity and encryption

Get up-to-date with the latest happenings in information security with our review of the past week.

5 key aspects for safe virtualization

Camilo Gutierrez Amaya looks at five key aspects for aspects that companies should be taken into consideration when developing a virtualization project.

Birds of a feather code together

Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security – while there is much to be done, there’s a lot to be optimistic about she says.

Instagram’s new API policy toughens access to its feed

Instagram’s new API policy makes it a lot harder for third party apps to gain access to its feed. News of this comes on the back of a malicious app harvesting its user’s details.

Fighting talk from Great Britain as it says it will hit back against internet attacks

British chancellor George Osborne has warned about the spectre of online terrorists attacking national infrastructure, and made some rather bold pronouncements about the UK’s willingness to engage in cyberwarfare to defend itself.

UK commits to new National Cyber Centre in 2016

The UK’s chancellor, George Osborne, has revealed that a new National Cyber Centre will be developed in 2016, helping the UK deliver a robust and centralized response to this growing threat.

Apple’s Tim Cook: There’ll be no backdoor in encryption

Apple’s Tim Cook has said in an interview with the Irish Independent that the idea of introducing backdoor access into encryption is ‘firmly off’ its agenda.

The security review: malware, child safety in the digital age and email security boost

Not quite sure what were the most interesting and intriguing information security stories of the past week? Not to worry – the security review has you covered.

Jail for British DDoS attacker, who said too much on Twitter

Although it’s far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty of people who have been put behind bars because of this modern-day crime.

Reclaim privacy with operational security says Snowden

Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.

7 things you need to know about car hacking

Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely to happen much more regularly in the future. We look at the top facts you need to know about this emerging trend.

Why continuous vulnerability assessments are necessary

The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.

Child safety in a digital age

Child safety in the 21st century is no longer about so-called real world concerns. In a digital age, parents now need to be aware of the risks that also exist online. Here are a few things to consider.

Follow us

Copyright © 2015 ESET, All Rights Reserved.