Microsoft says patch your Windows PCs now against critical security vulnerabilities

Don’t rest on your laurels. Patch your vulnerable computer systems now.

Car hacking at speed – where vulnerabilities turn from critical to fatal

What car hacking researchers Charlie Miller and Chris Valasek have discovered is worrying enough. But it sends a shudder down the spine to even contemplate how much worse things could be.

Researching Mr. Robot, Elliot’s world, and cybersecurity at Comic-Con

At Comic-Con 2016, ESET’s Anna Keeve dives deep into the “real” world of Mr. Robot, has a VR adventure, and looks for cybersecurity clues in Elliot’s room.

What the CISSP? 20 years as a Certified Information Systems Security Professional

Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.

Trident nuclear system to be updated to protect against hacking attacks

It’s a tough enough job protecting your home computer, or your business network, against the rising threat of malware and determined hackers… imagine if you were responsible for the security of Britain’s nuclear deterrent?

Facebook fights back against creepy impersonating profiles

It’s one of the creepiest things you can experience on Facebook. You stumble across the profile of “another” user who appears to have stolen the details of your life – lock, stock and barrel. And they are spreading slurs about your character, and befriending your contacts…

The women of ENIAC and the future of women in tech

In 1942 six mathematicians were selected to program a machine that would help the US army calculate complex wartime ballistics tables. They helped to create ENIAC – one of the world’s first ever electronic computers. They were also all women.

Introducing Google’s ‘Security Princess’: Parisa Tabriz

Parisa Tabriz may not be a household name, but it’s only a matter of time. We take a look at Google’s Security Princess, who is changing the face of tech.

Android has some critical remotely-exploitable security holes. But can you get the patch?

Remote code execution vulnerabilities have been found in the Android operating system, and patches released for Nexus devices.

But what about your smartphone? Is there a patch for you, and can you get your hands on it?

Security holes found in Windows, Office, Internet Explorer, Adobe… Start patching now!

Critical security patches have been released for Microsoft and Adobe products. Have you installed them yet?

Microsoft issues warning after Xbox Live certificate ‘inadvertently’ leaks

A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.

Nearly 157,000 TalkTalk customers had their personal details hacked

TalkTalk talks numbers – revealing that “only 4%” of its users were affected by the hacking attack on its systems.

Police force blames hacker after #CyberAware tweet sent out containing bogus security advice

Organisations of all sizes need to do more to protect their social media accounts from being hijacked.

5 things you’ve done wrong when asking your techie for help

Next time your computer breaks down or appears not to be working right, consider what not to do before you call your techie for some help.

Microsoft gaffe spooks users as weird Windows 7 update accidentally released

Good news – hackers hadn’t hijacked Microsoft’s Windows Update system. Bad news – users’ confidence will have been shaken again by Microsoft’s goof.

Update Flash now! Adobe releases patch, fixing critical security holes

It’s time to update Flash once again, and don’t forget to reduce the attack surface by enabling “Click to Play”… or uninstall it altogether.

NICE news about the cybersecurity skills shortage (and a call for papers)

The cybersecurity skills gap is a security problem and in the US the National Initiative For Cybersecurity Education (NICE) is seeking to reduce that gap.

Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals

As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.

Cybersecurity is increasingly a ‘board-level’ issue, finds report

The majority of managers believe that IT risk management data genuinely influences board decisions, according to Gartner.

What I learned at Cyber Boot Camp (Instructor Edition)

Teaching computer security to highly motivated students at Cyber Boot Camp reveals a lack of basic computer science education in California Schools.

Follow us

Copyright © 2016 ESET, All Rights Reserved.