category
General

Cyber risk analysis, assessment, and management: an introduction

Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.

The wider world of security research output: webinars

Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.

National Small Business Week: a cybersecurity survival guide

It’s National Small Business Week in the U.S. and, because properly protecting the digital assets of your small business could be vital to its success, here’s a cybersecurity survival guide.

RSA Conference 2015: too much technology and not enough people?

Major themes of the 2015 RSA Conference: the degree to which the deployment of digital devices is outpacing our ability to deploy humans with the necessary skills and knowledge needed to secure data and systems.

RSA 2015, the year security goes mainstream

What were the major themes from the RSA 2015 conference? Cameron Camp is on hand to give his verdict…

Twitter and YouTube blocked in Turkey over hostage photos

Access to popular social media sites such as Twitter and YouTube has been shut down in Turkey, following a court ruling today.

The human cost of phone hacking

Phone hacking ruined the lives of celebrities, and – in at least one case – almost drove a victim to suicide.

Hillary Clinton used personal email for government business, putting security at risk

Hillary Clinton might be in hot water after it is revealed that she never had an official email account, but was instead using a personal one. That’s potentially a breach of federal law, but it’s definitely a security risk.

It’s Safer Internet Day. So where is our Internet of Secure Things?

It’s Safer Internet Day. But millions of devices which have not been designed with security in mind are connecting to the internet. Shouldn’t we be able to tell the manufacturers that enough is enough?

Top Cyber Security Awareness Month themes, topics, and resources

National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).

Secret app takes mere minutes to hack, revealing anyone’s secret via simple vulnerability

Do you trust the internet with your secrets? Perhaps you shouldn’t, even if you’re using an app which professes to “deliver anonymously” secrets to your friends, and their circles, without identifying you as the originator…

Internet Service Providers “failing to protect” against cyber attacks, says EU agency

The European cyber security agency ENISA said Internet Service Providers in the EU have failed to implement a set of best practice recommendations which have been in place for 13 years – which could reduce the scope of even the largest DDoS attacks.

Supermarket security breach puts 2.4 million credit cards at risk

Up to 2.4 million credit cards may have been compromised after St. Louis grocery chain Schnucks was targeted with malware, the chain revealed this week.

Nine out of ten employees knowingly ignore cyber safety policies

The biggest cyber security problem large companies face could be employees – a survey reveals that nine out of ten employees knowingly ignore or violate their company’s data policies.

Oregon farm company sues its bank over $223,500 cyber-heist

An Oregon farm products company is suing its own bank to recover losses after a phishing attack saw $223,500 transferred to accounts in the Ukraine over a period of three days in 2010.

Obama increases spending to defend U.S. computer networks from cyber attacks

President Barack Obama proposed to increase Defense Department spending on cyber security to $4.7 billion this week – a rise of $800 million. This budget increase stands out against a background of broader Pentagon budget cuts.

Warning over “too much information” after power company targeted with spear-phishing campaign

Utility companies have been warned not to share information such as email addresses on company websites, after a spear-phishing attack on an American electricity company.

Security warning for firms still using Windows XP as deadline looms

More than half of British companies could be at risk of cyber attack, after a survey found that IT departments had not begun the process of migrating from Windows XP- with just a year left before Microsoft stops offering support for the ageing OS.

Walking through Win32/Jabberbot.A

Malware authors have a solid track record in regards to creative Command and Control protocols. We’ve seen peer-to-peer protocols, some custom (Sality), some standard (Win32/Storm uses the eDonkey P2P protocol). We’ve seen binary protocols (Win32/Peerfrag, aka Palevo). We’ve seen other custom protocols that leverage other standard protocols such as HTTP (Win32/Georbot), DNS (Morto)and IRC (Win32/AutoRun.IRCBot.AK),

2013 Forecast: Malware, scams, security and privacy concerns

What does the New Year hold for information security, malicious software, consumer privacy and cybercrime? Questions of this mature are posed by journalists toward the end of every year and, beginning about November, answers from security specialists start to appear in print. Indeed, ESET researchers in Latin America published a 20-page white paper on this

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2015 ESET, All Rights Reserved.