Author
Rob Waugh
Rob Waugh
Independent Correspondent

Highlights of your career? Interviewing one of the team that broke the Enigma code.

What malware do you hate the most? The Love Bug - I was the guy who opened it.

Favorite activities? Testing smartphones (I often have three or more on the go).

When did you get your first computer and what kind was it? 1984, ZX Spectrum.

Favorite computer game/activity? World of Warcraft - but I gave up, and have been 'clean' for two years.

More Info

David Harley: “New scams are difficult to spot even for a trained eye”

Harley says that scams and social engineering have been a constant in cybercrime – but in the past few years, some scams have got markedly more sophisticated, and more difficult even for a trained eye to spot.

What are the alternatives to passwords?

Is it time for big companies – at the very least – to abandon weak password security? If so, what password alternatives are there?

Facebook turns 11 – what you need to know, and what do your likes say about you?

Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about the new settings and how they could affect you.

Are you being tracked? How to spot a tracking app on your phone

Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.

6 WhatsApp Security Tips

Even though WhatsApp now encrypts all of its messages and data, it pays to be secure with your chats. Here are our top WhatsApp security tips.

Holiday security tips – booking online safely

With Christmas fast becoming a distant memory and the January blues setting in, thousands of us are turning our eyes to booking a holiday abroad. But the recent hacks at United and American Airlines show that hackers see the travel industry as fertile territory.

How can businesses save money on internet security in 2015?

A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.

Facebook privacy – why statements about copyright don’t do anything

Facebook users around the world have reported the return of the network’s longer-lasting hoaxes – a legal disclaimer which allows users to regain copyright over their images and other content. Here’s why it doesn’t work.

Police close in on Bitcoin fraudsters who stole $370m in Mt Gox collapse

Police are closing in on thieves who stole Bitcoin valued at $370 million during the collapse of popular exchange Mt Gox – and just 1% of the theft is believed to be the work of outside hackers.

Sony execs turned to old BlackBerries from basement in wake of attack

Sony executives turned to old BlackBerries found in a basement in the firm’s California headquarters in, using SMS text messages and a ‘phone tree’ to communicate in the wake of the attack.

Nvidia breach – employee information leaks

Graphics card company Nvidia suffered a data breach in which private employee information was leaked, the company has revealed.

Facebook privacy – network faces court for ‘reading user messages’

Facebook is to face a class action lawsuit over ‘reading’ its user’s messages, a U.S. judge has ruled.

Biometrics – can your fingerprint be ‘copied’ from a normal photo?

Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones – but biometrics may not be as secure as many believe.

Yik Yak – what security-conscious users need to know

It’s billed as the hottest new messaging app on the planet, and it’s rocketed into the top ten in the U.S. in just a year. But how safe are you on Yik Yak?

Webcam security – how to lock down the cameras in your home

Our tips will help you hacker-proof anything from baby monitors to surveillance cameras – and keep your home private.

Facebook hoax – how to tell instantly if a story is fake

Two-thirds of young people first learn about major news events via Facebook – but as cybercriminals cash in with hoax stories and links, it can be difficult to tell ‘real’ content from fake. Our tips can help.

Identity theft – six tips to help keep yours safe

Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves – if not more so. Lock yours down with our tips.

Gamer PCs – how to keep yours clean and mean

Gamers have become major targets for hackers – from large-scale attacks against gaming companies, to small-scale scams carried out via game chat channels. But a few easy security steps should help keep your precious rig at full speed – and safe.

Cyber Monday – 12 tips to help you shop safely online

Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.

Smart home security – how not to be dumb with your devices

It’s easy to imagine that ALL connected devices – from fridges to CCTV cameras – are a security nightmare, but there are simple, sensible steps you can take to lock these risks down.

Technology giants join forces to battle tech support phone scams

Google, Facebook, Twitter and AOL have joined forces to stamp out fake tech support services where customers are fooled into calling bogus technical support lines, where they are encouraged, not to fix their comptuer, but to install malware – or give away details crucial for identity theft.

Microsoft Internet Explorer zero day flaw will be even worse for XP users

Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.

Cybercrime evolves as criminal gangs join forces with spies – report

Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.

Cisco offers $300,000 for “visionary” solutions to defend ‘Internet of Things’

Networking giant Cisco has launched a “grand challenge” to invent a security solution for the “internet of things” – a broad term used to describe connected devices from industrial equipment to cars to smart home appliances.

Most small-office routers have ‘critical’ vulnerabilities as mysterious ‘Moon’ worm spreads

A large majority of routers used in small offices are plagued with security vulnerabilities – with up to 80% of small office/home office models having critical security weaknesses, according to a survey by Tripwire.

Two-thirds of couples ‘share passwords to online accounts’, Pew research finds

Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds of married couples sharing at least one password, a new study by Pew Internet has found.

Personal email and cloud storage pose ‘biggest threat’ to corporate data, report claims

Nearly two-thirds of employees – 63% – use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their accounts – and more than half of employees regularly transfer files by insecure channels.

Target attackers ‘broke in using log-in from air-con contractor’

Attackers involved in the Target breach, which led to the theft of 40 million debit and credit card details late last year, broke into the retailer’s network via a heating and air-conditioning contractor, according to a new report.

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

The 2014 threat trends report from ESET’s global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.

Phishing warning after Vodafone hack leaks personal information for 2 million customers

A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an insider, according to Vodafone.

The end? “Passwords are done,” says Google security chief

“Passwords are done at Google,” said Heather Adkins, Google’s information security chief – and said that “the game is over” for start-ups relying on passwords as the chief method to keep users secure.

A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will

These days cybercriminals will use phone calls, SMS messages, emails, fake apps – and even couriers – in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” – and catch phishers and fraudsters in the act.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

ESET Virus Radar

Archives

Select month
Copyright © 2015 ESET, All Rights Reserved.