Author
Editor

The security review: ESET release decryptor for TeslaCrypt ransomware

Welcome to this week’s security review, which includes ESET releasing a new decryptor for TeslaCrypt ransomware, new revelations about a 2012 LinkedIn data breach and expert insight into Operation Groundbait.

Will we ever fix ‘broken’ USB stick security?

As a recent study finds that half of people plug in USB sticks found at their work’s car parking lot, we ask if the USB security threat will ever go away.

The security review: Online safety for families and TalkTalk

Welcome to this week’s security review, which includes an online safety guide for families over the years, the repercussions of last year’s data breach at TalkTalk, and a warning from Adobe of a Flash zero-day vulnerability.

Online safety for families across the years

When it comes to online safety, it can be difficult to understand what’s suitable for different age groups. Our guide offers advice on how to manage this over the years.

The security review: Jigsaw and passphrases

Welcome to this week’s security review, which includes Jigsaw & the increasing aggressiveness of ransomware and the importance of passphrases.

Data loss scenarios: Which are the most probable?

Research shows that running regular backups for data, as well as encrypting them, is necessary for organizations to ensure that their information is safe.

Forget about passwords: You need a passphrase!

Forget about passwords – it’s all about passphrases. Longer, more complex and easy to remember, they will help you be more safe and secure. Our guide shows you how to create a passphrase.

Say goodbye to cyber stresses in the workplace

On World Day for Safety and Health at Work, we’ve put together a brief guide on potential cyber stresses to avoid in the workplace.

Companies fear data breaches caused by compromised credentials

Two thirds of security professionals rate the risk of a future data breach, due to compromised credentials, as medium or high.

Insider threats: A persistent and widespread problem

In this feature, we take a look at some of the key things you should be aware of to ensure that you are well-equipped to deal with insider threats.

The security review: Dorkbot, encryption and buildings

Welcome to this week’s security review, which includes Dorkbot, the importance of encryption and how buildings are at threat of cyberattacks.

Dorkbot: 5 years since detection

In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.

Cybersecurity checkup: New Ponemon study reveals how healthcare sector is doing

How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.

Medical data breach leads to a record cash settlement

California hospital pays the largest sum per plaintiff in history for its inability to secure the patients’ medical data.

And how do you protect your webcam?

Recently, FBI director James Comey revealed that he covers his webcam with tape to protect his privacy. It begs the question: How do you protect your webcam?

The security review: Locky, Mumblehard takedown and Facebook scams

Welcome to this week’s security review, which includes an in-depth look at how the ransomware dubbed Locky is infiltrating computer systems.

Ransomware threat highlights why backing up data is essential

There has been a marked increase in ransomware attacks recently. We take a look at what this means and why backing up your data helps you combat this threat.

Twitter security noticeboard

As Twitter celebrates its 10th birthday, we take a look at things from a security point of view with our ‘noticeboard’ feature. Here’s to 10, 20, 30 and many more successful years of tweeting.

The security review: What you need to know about Locky

Highlights from the past seven days in information security include the threat from Locky, the nuisance of Robocalls and another celeb-related iCloud breach.

The security review: Android banking trojan poses as Flash Player

Highlights from the past seven days in information security include an Android banking trojan that not only has the ability to pose as Flash Player, but can also bypass 2FA security as well.

Follow us

Copyright © 2016 ESET, All Rights Reserved.