Smartphone authentication: is biometric technology ready to replace PINs and passwords?
Search Engine Optimization: it’s an essential component of internet marketing strategy, I guess, but one with a bad public image, especially in the wake of years of abuse of optimization techniques by purveyors of malware and other bad actors (Black Hat SEO, or BHSEO).
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity.
While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.
ESET conference papers from the 2014 Virus Bulletin and AVAR conferences are now available.
The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.
Autumn: the season of mists and mellow fruitfulness, not to mention a couple of excellent security conferences. Virus Bulletin and AVAR make a very tasty Conference Pair.