21st century cybercriminals are more sophisticated, daring and organized than ever. The threat landscape has evolved.
Detected by ESET as Android/Twitoor, this malware is unique because of its resilience mechanism. Instead of being controlled by a traditional command-and-control server, it receives instructions via tweets.
Infosec is a technical discipline, but it also requires good, skilled cybersecurity professionals. We take a look at the bigger picture.
ESET researchers have spotted fake patch apps for Android – probably the first ever malicious mobile apps masquerading as a patch for a recently discovered vulnerability.
There are three key principles to be aware of when it comes to the EU-US Privacy Shield and we’ve digested all of the key points in this feature.
In the spirit of this year’s Olympics, which is being held in Rio de Janeiro, we thought we’d host our own little information security Olympic Games.
When it comes to APAC cybersecurity, there is room for improvement. In this feature we take a look at key trends across this region.
Welcome to this week’s security review, including a closer look at cash machine security as ATMs turn 49 years old.
Knowing where your weak spots are as organization is important, as is ensuring that you actively do everything you can to stay secure from data leaks.
Welcome to this week’s security review, which includes an in-depth discussion of the most common reasons for corporate data loss.
Welcome to this week’s security review, which includes detail on the evolution of Nemucod and thoughts on Windows 10 one year on from its launch.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site