latest posts

Cyberattacks should be included in international humanitarian law

The seriousness of cyberattacks is such that it should be included in international humanitarian law, a new report from the Global Commission on Internet Governance has said.

Google makes two-step verification easier

Google has just introduced a new feature for users to make its two-step verification (2SV) process easier.

Facebook’s Mark Zuckerberg ‘tapes over webcam’

A Facebook post from Mark Zuckerberg ‘reveals’ that he is serious about security, as it seems to show that his webcam is covered up with tape.

Acer experiences major data breach

Acer has experienced a major data breach, with up to 34,500 of its customers thought to be affected. It has already submitted a “breach notification sample” to the Office of the Attorney General in California.

The 5 most common reasons for corporate data loss

ESET’s Josep Albors takes a look at the main reasons for corporate data loss, which include undetected drives and devices being dropped from height.

UK MPs call for tougher sanctions against cybercriminals

Individuals convicted of unlawfully obtaining or selling personal data should serve up to two years in prison, according to a new report from the UK’s culture, media and sports committee.

Scammers claim there is a virus in Apple’s iTunes database

Scammers are once again targeting Apple customers in their attempt to hijack accounts and steal payment information.

The security review: Nemucod, cyberbullying and Windows 10 one year on

Welcome to this week’s security review, which includes detail on the evolution of Nemucod and thoughts on Windows 10 one year on from its launch.

T-Mobile Czech Republic ‘suffers data leak’

T-Mobile Czech Republic has experienced a data leak, affecting 1.5 million of its customers, it has been claimed by local media.

Nato: Cyberspace is an operational domain of warfare

Nato has acknowledged that cyberspace is now an operational domain of warfare, along with air, sea and land.

Do you know if your child is being cyberbullied? These are the red flags

As June 17th is Stop Cyberbullying Day, we have prepared a list of indicators that can help parents recognize whether their offspring is being cyberbullied.

Nemucod ups its game

The creators of Nemucod, the code responsible for downloading and executing malware like Locky, have been hard at work polishing their code.

Organizational cybersecurity efforts ‘needs bolstering’

Organizations need to take charge of their cybersecurity efforts to ensure they are well-equipped to deal with this growing threat.

Comparing dads across nations: Who has the strictest parents?

Which country has the strictest parents? ESET’s recent survey tests whether old stereotypes ring true in the digital era.

Windows 10 security and privacy: An in-depth review and analysis

As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.

VerticalScope experiences major data breach: 45 million records stolen

VerticalScope has experienced a major data breach, with cybercriminals making off with over 45 million records belonging to over 1,100 websites, it has been reported.

Quantum Computation: A cryptography armageddon?

ESET’s Cassius Puodzius takes an in-depth look at cryptography, exploring quantum computing (one of the resources in the toolkit of cryptanalysts).

Apple looks into the benefits of differential privacy

Differential privacy is going to be key to how Apple collects, stores and uses data, the tech giant revealed during its Worldwide Developers Conference.

The security review: Ray-Ban scam is back

Welcome to this week’s security review, including news of a returning Ray-Ban scam that has spread from social media to email.

32 million Twitter account credentials up for grabs – but site says it wasn’t hacked

Over 30 million Twitter account details are put up for sale on the computer underground.

Follow us

Copyright © 2016 ESET, All Rights Reserved.