Young people are targeted for data theft at 35 times the rate of adults – they are considered an easy target for both digital and physical theft. You can make going back to school an easier transition by ensuring your data and devices are secure both at school and at home.
New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.
Criminals are very interested in retailers’ Point of Sale (PoS) machines. Recently, a new type of malware has been found that specifically tries to break into PoS machines, called Win32/BrutPOS.A.
Graduation is a great time to review your social media profile. Don’t let a wild and crazy social network presence undermine the promise of graduation, your chances for a scholarship, job, internship or other career choices.
As the 145 million people affected by the security breach at online giant eBay get used to the idea that their personal information may be “out there” and their passwords need to be changed, we wanted to update yesterday’s coverage of the story.
eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.
There has been a lot of talk in the news lately of a new ransomware for Android. While this does sound dire, and the possibility exists for more problematic threats on Androids in the future, it is not yet time to panic.
Tax identity fraud is on the rise this year, possibly due to criminals getting craftier in their choice of breach targets. According to a series of reports from Brian Krebs, fraudsters are now targeting third-party payroll services.
When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.
You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.
It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.
When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.
Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.
One of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.
The city of Chicago recently announced a change to the curriculum for schools in their district that would introduce children as young as primary school to computer science concepts. It would also allow students to count computer science as a core subject that fulfills graduation requirements. What does this say about the current state of computer-related education?
Read how to protect yourself if you’ve been shopping with credit or debit cards (and who hasn’t?). As the scope of the latest cyber crime spree expands beyond Target and Neiman Marcus, malicious software is suspected.
A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting businesses big and small.