Author
Editor

Data loss scenarios: Which are the most probable?

Research shows that running regular backups for data, as well as encrypting them, is necessary for organizations to ensure that their information is safe.

Forget about passwords: You need a passphrase!

Forget about passwords – it’s all about passphrases. Longer, more complex and easy to remember, they will help you be more safe and secure. Our guide shows you how to create a passphrase.

Say goodbye to cyber stresses in the workplace

On World Day for Safety and Health at Work, we’ve put together a brief guide on potential cyber stresses to avoid in the workplace.

Companies fear data breaches caused by compromised credentials

Two thirds of security professionals rate the risk of a future data breach, due to compromised credentials, as medium or high.

Insider threats: A persistent and widespread problem

In this feature, we take a look at some of the key things you should be aware of to ensure that you are well-equipped to deal with insider threats.

The security review: Dorkbot, encryption and buildings

Welcome to this week’s security review, which includes Dorkbot, the importance of encryption and how buildings are at threat of cyberattacks.

Dorkbot: 5 years since detection

In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.

Cybersecurity checkup: New Ponemon study reveals how healthcare sector is doing

How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.

Medical data breach leads to a record cash settlement

California hospital pays the largest sum per plaintiff in history for its inability to secure the patients’ medical data.

And how do you protect your webcam?

Recently, FBI director James Comey revealed that he covers his webcam with tape to protect his privacy. It begs the question: How do you protect your webcam?

The security review: Locky, Mumblehard takedown and Facebook scams

Welcome to this week’s security review, which includes an in-depth look at how the ransomware dubbed Locky is infiltrating computer systems.

Ransomware threat highlights why backing up data is essential

There has been a marked increase in ransomware attacks recently. We take a look at what this means and why backing up your data helps you combat this threat.

Twitter security noticeboard

As Twitter celebrates its 10th birthday, we take a look at things from a security point of view with our ‘noticeboard’ feature. Here’s to 10, 20, 30 and many more successful years of tweeting.

The security review: What you need to know about Locky

Highlights from the past seven days in information security include the threat from Locky, the nuisance of Robocalls and another celeb-related iCloud breach.

The security review: Android banking trojan poses as Flash Player

Highlights from the past seven days in information security include an Android banking trojan that not only has the ability to pose as Flash Player, but can also bypass 2FA security as well.

The women of ENIAC and the future of women in tech

In 1942 six mathematicians were selected to program a machine that would help the US army calculate complex wartime ballistics tables. They helped to create ENIAC – one of the world’s first ever electronic computers. They were also all women.

Introducing Google’s ‘Security Princess’: Parisa Tabriz

Parisa Tabriz may not be a household name, but it’s only a matter of time. We take a look at Google’s Security Princess, who is changing the face of tech.

The security review: Security is ‘easy’ – just ask someone at RSA

Welcome to this week’s security review, in which we’ll be assessing the buzzword-laden security startups of RSA, and rounding up the week’s biggest stories.

The family security checklist

Keeping your family safe online is not about making a one-off investment in a security solution. It requires a proactive approach, once every two to three months for example, where you tick off a checklist. Here are five things to keep on top of.

The security review: porn clicker trojans at Google Play

Highlights from the past seven days in information security include porn clicker trojans at Google Play, digital childhoods and the security/privacy debate.

Follow us

Copyright © 2016 ESET, All Rights Reserved.