Author
Editor

The security review: Nemucod, cyberbullying and Windows 10 one year on

Welcome to this week’s security review, which includes detail on the evolution of Nemucod and thoughts on Windows 10 one year on from its launch.

T-Mobile Czech Republic ‘suffers data leak’

T-Mobile Czech Republic has experienced a data leak, affecting 1.5 million of its customers, it has been claimed by local media.

The security review: Ray-Ban scam is back

Welcome to this week’s security review, including news of a returning Ray-Ban scam that has spread from social media to email.

From a drip to a flood: The impact of a data leak

Data leaks, especially from an organization’s point of view, are a huge and growing problem. The impact can be severe, as this feature highlights.

The security review: Crouching Tiger, Hidden DNS

Welcome to this week’s security review, including the story of a DNS hijack that sets the victim’s computer to use specific DNS servers.

The security review: ESET release decryptor for TeslaCrypt ransomware

Welcome to this week’s security review, which includes ESET releasing a new decryptor for TeslaCrypt ransomware, new revelations about a 2012 LinkedIn data breach and expert insight into Operation Groundbait.

Will we ever fix ‘broken’ USB stick security?

As a recent study finds that half of people plug in USB sticks found at their work’s car parking lot, we ask if the USB security threat will ever go away.

The security review: Online safety for families and TalkTalk

Welcome to this week’s security review, which includes an online safety guide for families over the years, the repercussions of last year’s data breach at TalkTalk, and a warning from Adobe of a Flash zero-day vulnerability.

Online safety for families across the years

When it comes to online safety, it can be difficult to understand what’s suitable for different age groups. Our guide offers advice on how to manage this over the years.

The security review: Jigsaw and passphrases

Welcome to this week’s security review, which includes Jigsaw & the increasing aggressiveness of ransomware and the importance of passphrases.

Data loss scenarios: Which are the most probable?

Research shows that running regular backups for data, as well as encrypting them, is necessary for organizations to ensure that their information is safe.

Forget about passwords: You need a passphrase!

Forget about passwords – it’s all about passphrases. Longer, more complex and easy to remember, they will help you be more safe and secure. Our guide shows you how to create a passphrase.

Say goodbye to cyber stresses in the workplace

On World Day for Safety and Health at Work, we’ve put together a brief guide on potential cyber stresses to avoid in the workplace.

Companies fear data breaches caused by compromised credentials

Two thirds of security professionals rate the risk of a future data breach, due to compromised credentials, as medium or high.

Insider threats: A persistent and widespread problem

In this feature, we take a look at some of the key things you should be aware of to ensure that you are well-equipped to deal with insider threats.

The security review: Dorkbot, encryption and buildings

Welcome to this week’s security review, which includes Dorkbot, the importance of encryption and how buildings are at threat of cyberattacks.

Dorkbot: 5 years since detection

In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.

Cybersecurity checkup: New Ponemon study reveals how healthcare sector is doing

How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.

Medical data breach leads to a record cash settlement

California hospital pays the largest sum per plaintiff in history for its inability to secure the patients’ medical data.

And how do you protect your webcam?

Recently, FBI director James Comey revealed that he covers his webcam with tape to protect his privacy. It begs the question: How do you protect your webcam?

Follow us

Copyright © 2016 ESET, All Rights Reserved.