latest posts

Bitcoin community ‘needs to collaborate’ over security and scalability

In an open letter to members of its own community, Bitcoin developers and contributors have called for greater cooperation over security and scalability.

Multiple vulnerabilities identified in Belkin router

An expert says that a popular Belkin router contains numerous vulnerabilities, making it extremely susceptible to attacks.

10 steps to staying secure on public Wi-Fi

The convenience of public Wi-Fi for many people is invaluable, yet there are risks. With all this in mind, here are 10 tips to staying safe.

VMworld: VM acceleration – how do we get there?

If you have a ton of VMs sprawling the globe, how do you make them all fast? That’s the subject floating around the show floor at VMworld in SFO this year.

UK’s National Crime Agency hit by DDoS attack, following LizardStresser arrests

Last week, users of Lizard Squad’s DDoS-on-demand service were feeling the heat after arrests were made by UK police. This week, it’s the UK’s National Crime Agency which has found itself the victim of a denial-of-service attack.

Wikipedia blocks 381 sockpuppet accounts

Up to 381 sockpuppet accounts have been blocked by Wikipedia because they were engaged in undisclosed paid advocacy.

VMworld: Got a ton of VMs? Now what?

This year VMworld tackles what happens when your VM farm grows up and spawns hundreds or thousands of baby VMs

8 security tips for gamers: go play with no worries!

It is possible to enjoy videogames by applying practical security measures that will keep us safe. In this article, we look at 8 security tips.

LizardStresser: Six people arrested in connection with Lizard Squad’s DDoS attack tool

British police have today announced the arrest of six people in connection with distributed denial-of-service (DDoS) attacks that attempted to bring down websites belonging to – amongst others – a national newspaper, a school and a number of online retailers.

iOS vulnerability Ins0mnia fixed by Apple

Apple has resolved a serious security vulnerability known as Ins0mnia in its latest update.

Security of Ashley Madison breached sooner than you think

The Ashley Madison attack could be one of the most notable instances of cybercrime in 2015. Here’s a timeline of the key events.

Support scams, malware and mindgames without frontiers

Introduction It might not have escaped your notice that I write quite a lot about support scams, an issue in which most commentators in the security industry take only sporadic interest and tend to regard as of only niche interest. (As when a scammer is damaging their brand or product in some way, for instance

Dolphin and Mercury Android browsers have major vulnerabilities

Dolphin and Mercury Android browsers have major vulnerabilities, allowing for remote code execution and arbitrary reading and writing of files.

An Ashley Madison response plan: does your company have one?

The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here’s what you need to know.

Windows 95 turns 20: The OS We All Love To Hate

1995 was a landmark year for technology, the internet and home computing. We can thank Windows 95 for a lot of the perks we find ourselves with today.

A big day for consumers: Companies answerable for poor cybersecurity

FTC has the authority to hold organisations to account for failing to deliver tough cybersecurity measures.

Make password into a story and more parental hacks

It’s important to ensure your child’s data and devices are secure at school and at home. Check out our to back to school digital security guide.

How does facial recognition technology work?

In this hi-tech age, your face is increasingly becoming a digital ID for authenticating who you are online. We look at how facial recognition works.

Ashley Madison members ‘easy target for extortion’

There is the very real possibility that members of the infidelity website Ashley Madison may be subject to extortion threats.

How to nurture your child’s security genius

Is your child a security genius? If you think so, here’s what you can do to harness that potential for a career that is exciting and financially lucrative.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
our experts

Cameron Camp

Graham Cluley

David Harley

Stephen Cobb

Lysa Myers

Bruce Burrell

Raphael Labaca Castro

Anton Cherepanov

Aryeh Goretsky

Robert Lipovsky

Lukas Stefanko

Joan Calvet

Copyright © 2015 ESET, All Rights Reserved.