latest posts

Growth of cybercrime is ‘ruthless’

Cybercrime has established itself as a permanent fixture in 21st century life, with the number of incidents and victims continuing to rise with dogged determination.

Krebs’ website remains online following massive DDoS attack

Brian Krebs’ website appears be to be holding up, following what has been described as “one of the biggest web attacks ever seen”.

What Pippa Middleton can teach us about iCloud security

Pippa Middleton is the latest in a long line of celebrities to have her online accounts broken into by criminals, and private photographs stolen.

Have you properly secured your iCloud account?

DDoS robots for the masses: IoT security comes of age

IoT security matters more than ever, explains ESET’s Cameron Camp, as the technology, which offers us so much, is vulnerable to attack from cybercriminals.

USBee: how to spy on an isolated system with a USB

USBee is a form of “air gap attack”. It uses a USB device to transmit the information the attacker wants to steal at frequencies between 240 and 480Mhz.

Mr. Robot security recap: 10 lessons learned from Season 02

Cybersecurity and hacking play a leading role in the series, so with Mr. Robot season 02 almost over, we want to do a reality check on the scenarios we saw.

8 years of Android: malware, malicious apps, and how to stay safe

At eight years old, Android is hugely popular. Both with users and attackers.

Half a billion Yahoo users victim to ‘biggest data breach in history’

Yahoo has confirmed that half a billion users may have had their data stolen in what has been described as the ‘biggest data breach in history.’

Book of Eli: African targeted attacks

ESET’s latest research analyzes a piece of malware active since 2012, but which has targeted one specific country – Libya.

5 simple ways you can protect yourself from phishing attacks

With these top tips, you should have no trouble in keeping yourself protected against all sorts of phishing attacks.

Tesla Model S hacked from 12 miles away

A team of researchers was able to hack the controls of a Tesla Model S from a distance of 12 miles – adjusting the mirrors, locks and even slamming on the brakes.

Cybersecurity becoming a key boardroom agenda item

An increase in the number of cyberattacks and growing awareness of the threat has made cybersecurity a key boardroom level consideration.

Snowden: 4 big security and privacy assumptions he undermined

ESET’s Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.

Internet of targets: Webcams and routers in the crosshairs of bad guys

Video rules the internet today and webcams are built into practically every new laptop, smartphone and tablet. It’s important to keep them secure.

WADA cyberattack compromises agency’s database

The World Anti-Doping Agency (WADA) has revealed that it was the victim of a cyberattack, which it has attributed to the Russian cyber espionage group, Tsar Team (APT28).

How encryption molded crypto-ransomware

Recently ESET has seen significantly increasing volumes of a particular type of ransomware known as crypto-ransomware, reports Cassius Puodzius.

Security takes a backseat for uninterrupted, video game marathons

New research from ESET, which polled over 500 gamers, has found that 6% of gamers have spent around a full-day immersed in a video game.

At what age should kids be able to access online services?

In this article, ESET’s Miguel Ángel Mendoza asks: “At what age should kids be able to access online services?”

Google to draw attention to insecure HTTP websites

Google is looking to deliver even greater transparency when it comes to online security by identifying publicly – or “marking”, as it puts it – websites that are not as secure as they should be.

Grace Hopper: Computer bugs & the language of programming

WeLiveSecurity takes a look back at the life of the programming pioneer US Navy Rear Admiral Grace Hopper, who changed the world of technology.

Follow us

Copyright © 2016 ESET, All Rights Reserved.