Author
Editor

21st century cybercriminals: The threat landscape has evolved

21st century cybercriminals are more sophisticated, daring and organized than ever. The threat landscape has evolved.

First Twitter-controlled Android botnet discovered

Detected by ESET as Android/Twitoor, this malware is unique because of its resilience mechanism. Instead of being controlled by a traditional command-and-control server, it receives instructions via tweets.

Why you should hire good, skilled cybersecurity professionals

Infosec is a technical discipline, but it also requires good, skilled cybersecurity professionals. We take a look at the bigger picture.

QuadRooter: Unfortunately, you can’t have it patched for now

ESET researchers have spotted fake patch apps for Android – probably the first ever malicious mobile apps masquerading as a patch for a recently discovered vulnerability.

EU-US Privacy Shield launches: Key points to this agreement

There are three key principles to be aware of when it comes to the EU-US Privacy Shield and we’ve digested all of the key points in this feature.

Old Facebook scam gets ready for new boost

ESET researchers are warning about a Facebook scam that spreads fake terror news to trick victims into disclosing their Facebook credentials.

The 10 Security Commandments for every SysAdmin

Celebrating the 17th annual SysAdmin Day, we recognize their dedication and workplace contributions and want to show appreciation for their talent.

5 highlights from the ‘Information Security Olympic Games’

In the spirit of this year’s Olympics, which is being held in Rio de Janeiro, we thought we’d host our own little information security Olympic Games.

APAC cybersecurity: Plenty of room for improvements

When it comes to APAC cybersecurity, there is room for improvement. In this feature we take a look at key trends across this region.

Flashback Friday: The Melissa virus

In 1999, David L. Smith launched the Melissa virus. Within a few hours, it had infected thousands of computers. We take a look back at its impact.

Data leak dangers: Know your weak spots

When it comes to data leaks, what are the major weak spots you need to be looking out for? This feature explores three common causes.

The security review: How secure are our cash machines?

Welcome to this week’s security review, including a closer look at cash machine security as ATMs turn 49 years old.

How to secure your social media accounts

Social media platforms are increasingly being targeted, as Facebook CEO Mark Zuckerberg found out earlier this month. Here, we look at how to keep your accounts secure.

Digital patch kit: How to protect yourself from data leaks

Knowing where your weak spots are as organization is important, as is ensuring that you actively do everything you can to stay secure from data leaks.

The security review: The 5 most common reasons for corporate data loss

Welcome to this week’s security review, which includes an in-depth discussion of the most common reasons for corporate data loss.

The security review: Nemucod, cyberbullying and Windows 10 one year on

Welcome to this week’s security review, which includes detail on the evolution of Nemucod and thoughts on Windows 10 one year on from its launch.

T-Mobile Czech Republic ‘suffers data leak’

T-Mobile Czech Republic has experienced a data leak, affecting 1.5 million of its customers, it has been claimed by local media.

The security review: Ray-Ban scam is back

Welcome to this week’s security review, including news of a returning Ray-Ban scam that has spread from social media to email.

From a drip to a flood: The impact of a data leak

Data leaks, especially from an organization’s point of view, are a huge and growing problem. The impact can be severe, as this feature highlights.

The security review: Crouching Tiger, Hidden DNS

Welcome to this week’s security review, including the story of a DNS hijack that sets the victim’s computer to use specific DNS servers.

Follow us

Copyright © 2016 ESET, All Rights Reserved.