Rob Waugh
Rob Waugh
Independent Correspondent
Go to latest posts

Facebook privacy – network faces court for ‘reading user messages’

Facebook is to face a class action lawsuit over ‘reading’ its user’s messages, a U.S. judge has ruled.

Biometrics – can your fingerprint be ‘copied’ from a normal photo?

Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones – but biometrics may not be as secure as many believe.

Yik Yak – what security-conscious users need to know

It’s billed as the hottest new messaging app on the planet, and it’s rocketed into the top ten in the U.S. in just a year. But how safe are you on Yik Yak?

Webcam security – how to lock down the cameras in your home

Our tips will help you hacker-proof anything from baby monitors to surveillance cameras – and keep your home private.

Facebook hoax – how to tell instantly if a story is fake

Two-thirds of young people first learn about major news events via Facebook – but as cybercriminals cash in with hoax stories and links, it can be difficult to tell ‘real’ content from fake. Our tips can help.

Identity theft – six tips to help keep yours safe

Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves – if not more so. Lock yours down with our tips.

Gamer PCs – how to keep yours clean and mean

Gamers have become major targets for hackers – from large-scale attacks against gaming companies, to small-scale scams carried out via game chat channels. But a few easy security steps should help keep your precious rig at full speed – and safe.

Cyber Monday – 12 tips to help you shop safely online

Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.

Smart home security – how not to be dumb with your devices

It’s easy to imagine that ALL connected devices – from fridges to CCTV cameras – are a security nightmare, but there are simple, sensible steps you can take to lock these risks down.

Can e-cigarettes give you malware?

The long-term health effects of electronic cigarettes – or E-cigarettes – are still open for discussion – but the devices could harm your computer, at least if one report is to be believed.

Week in Security: Grief for gamers, Unicorn spotted – and America wakes up

Cybercriminals once again had gamers in their sights this week, with leaks of multiple account details and a new Steam scam – but there was good news in the form of upgraded security on Whatsapp, and dawning awareness on privacy.

Facebook scams – ‘Naked woman eaten by shark’ is latest bait

The latest salacious video – promising ‘Naked Woman Eaten by a Shark’ – is just one in a long chain of viral video scams spread via Faceboook.

More than half of British firms ‘would consider hiring hackers’

More than half of British firms would consider hiring computer hackers in the face of a severe skills shortage – and more than 50% of executives said that they would consider hiring an expert even if they had a criminal record

Wireless attacks against ‘air gapped’ targets are possible, Israeli team claims

A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air-gapped network, install malware, and retreive information – without using hardware such as USB keys.

Footage from thousands of home webcams found streaming on Russian site

A Russian website is showing off hundreds of feeds of live webcam footage from inside homes and businesses, which have been accessed by hacking into people’s webcams, CCTV systems and monitors.

U.S. State Department shuts down entire email system after suspected attack

The U.S. State Department has shut down its entire unclassified email system after a suspected intrusion – and technicians are now working to beef up email security systems.

Steam gamers targeted with ‘free screensaver’ phishing scam

Gamers on the popular Steam gaming service have been targeted with phishing scams via the service’s popular Marketplace – with apparent ‘bargains’ offering a sting in the tail.

Apple Pay and security – what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments – both from Apple’s own system, and rivals playing catch-up.

Google security – how to lock down your Google account

If you use Gmail as your ‘main’ email account – or rely on Google services such as Drive for work – it’s well worth revisiting Google’s Settings menus to give your Google security a boost.

Wearable tech and security – can watches help?

So far, wearable tech has been of interest mainly to fitness fiends – but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even ‘three-factor security’. Can a watch really keep secrets?

Privacy online – what you can do (and what you can’t)

Many of us have moments when we need, or want, to be more private online – when searching for a new job, for instance, or when having a private business conversation.

Technology giants join forces to battle tech support phone scams

Google, Facebook, Twitter and AOL have joined forces to stamp out fake tech support services where customers are fooled into calling bogus technical support lines, where they are encouraged, not to fix their comptuer, but to install malware – or give away details crucial for identity theft.

No credit card required – Swedish shops let you pay in blood

At 15 payment machines dotted around the Swedish city of Lund, people can buy items without needing a card – or a phone equipped with a “Near Field” chip. All that’s required are the correct veins.

Microsoft Internet Explorer zero day flaw will be even worse for XP users

Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.

Cybercrime evolves as criminal gangs join forces with spies – report

Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.

‘Heartbleed thingumajig’ man suffers heartbleed hackers revenge

Man challenges hackers to break into accounts after complaining Heartbleed was “overhyped” – and has online life destroyed in minutes.

Heartbleed bug: worse than feared and could affect “billions”

The full scope of the Heartbleed bug came to light in a series of reports by researchers and white-hat hackers, with some claiming a billion smartphones may be at risk, as well as a statement allegedly from the US government over its use of the bug.

Heartbleed encryption flaw leaves millions of sites at risk

The Heartbleed bug – a flaw in an encryption technology used to protect major websites including Yahoo – has left a huge amount of private data at risk – and internet giants are scrambling to find fixes for a problem which could leave customer data exposed to criminals.

Cisco offers $300,000 for “visionary” solutions to defend ‘Internet of Things’

Networking giant Cisco has launched a “grand challenge” to invent a security solution for the “internet of things” – a broad term used to describe connected devices from industrial equipment to cars to smart home appliances.

Most small-office routers have ‘critical’ vulnerabilities as mysterious ‘Moon’ worm spreads

A large majority of routers used in small offices are plagued with security vulnerabilities – with up to 80% of small office/home office models having critical security weaknesses, according to a survey by Tripwire.

Two-thirds of couples ‘share passwords to online accounts’, Pew research finds

Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds of married couples sharing at least one password, a new study by Pew Internet has found.

Personal email and cloud storage pose ‘biggest threat’ to corporate data, report claims

Nearly two-thirds of employees – 63% – use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their accounts – and more than half of employees regularly transfer files by insecure channels.

Two-factor authentication: What is it – and why do I need it?

Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ‘2FA’.

Target attackers ‘broke in using log-in from air-con contractor’

Attackers involved in the Target breach, which led to the theft of 40 million debit and credit card details late last year, broke into the retailer’s network via a heating and air-conditioning contractor, according to a new report.

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

The 2014 threat trends report from ESET’s global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.

Warning over “risky behavior” of under-12s online – and parents need to take action

Children indulge in highly risky behavior online – with nearly one in five 9-11 year olds having physically met strangers they encountered online. Others use false identities – with some under-10s pretending to be 25.

Phishing warning after Vodafone hack leaks personal information for 2 million customers

A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an insider, according to Vodafone.

The end? “Passwords are done,” says Google security chief

“Passwords are done at Google,” said Heather Adkins, Google’s information security chief – and said that “the game is over” for start-ups relying on passwords as the chief method to keep users secure.

A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will

These days cybercriminals will use phone calls, SMS messages, emails, fake apps – and even couriers – in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” – and catch phishers and fraudsters in the act.

Follow us

Copyright © 2016 ESET, All Rights Reserved.