category

Cybersecurity

How is cryptography incorporated into PoS terminals?

Whenever there is information that needs to be protected, there is a need to use cryptographic solutions. POS applications are no exception explains ESET’s Lucas Paus.

Managing security in virtualized environments – agent-based or agentless?

Before you jump into the virtualization migration process, there are a few things to consider, like security, explains ESET’s Miguel Angel Mendoza.

ESET predictions and trends for cybercrime in 2016

It’s that time of the year when the information security industry takes part in its annual tradition: coming up with cybercrime predictions and trends for the next 12 months.

Star Wars: A New Hope – 5 information security lessons

If you are looking to boost your cybersecurity prowess, then make some time for the first Star Wars film, A New Hope. You’d be surprised at what this hugely popular and successful movie has to offer.

How do you know if your smartphone has been compromised?

Many people are unaware of what measures they can take to identify malicious activity on their smartphone. We look at how at the key signs to be aware of.

Securing devices at Christmas: Wordsearch

Test your device security nous with our festive-inspired wordsearch. By the end of it, we reckon you’ll have a solid grasp of what’s required this Christmas.

12 tree-mendous security tips for Christmas

Tis’ the season to be jolly but Christmas is also a happy time of year for cybercriminals looking for their own gifts. We look at what you can do to ensure it’s only Santa that is allowed to bypass your security.

Cyber experts ‘in hot demand’

The demand for cyber experts is at a record high, with more firms eager to secure the services of experts to ensure they are safe from attacks. And they’re willing to pay top dollar.

Safe, secure online shopping at home and on the go

At home, on the move, on a computer or via a mobile, online shopping habits have changed massively as technology as become more powerful. With Christmas around the corner, we look at some of the key details.

Virtual machine security – offloading the endpoint

If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even enter the endpoint, asks ESET’s Cameron Camp.

Russians embrace Bitcoins, the West sticks with PayPal

According to a new survey from ESET, the Europeans are leading the way with the online payment methods. Americans meanwhile prefer traditional alternatives.

How your nationality may influence your online Black Friday shopping

When it comes to shopping online, Germany is the most security conscious country in the world – most will use a security solution to thwart cybercriminals.

5 key aspects for safe virtualization

Camilo Gutierrez Amaya looks at five key aspects for aspects that companies should be taken into consideration when developing a virtualization project.

Birds of a feather code together

Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security – while there is much to be done, there’s a lot to be optimistic about she says.

UK commits to new National Cyber Centre in 2016

The UK’s chancellor, George Osborne, has revealed that a new National Cyber Centre will be developed in 2016, helping the UK deliver a robust and centralized response to this growing threat.

Why continuous vulnerability assessments are necessary

The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.

Why mobile security is more important than ever before

In this feature we explore why mobile security is of the utmost importance for individuals and organizations. If smartphones and tablets not adequately protected, they are extremely vulnerable to being exploited.

Cybersecurity research boost for medical devices

A Texas university is to research cybersecurity solutions to vulnerabilities in medical devices, boosted by a major grant from the National Science Foundation.

Is the cloud more secure for you? Only you hold the answer

Thinking of using the cloud, but have doubts whether it’s secure enough? You are not alone. Many enterprises hesitate to fully embrace it, fearing that their sensitive data might get compromised when stored online. But is the risk really high or can it be managed?

3 recommendations that can make your applications safer

Are you working on a new application? If so, consider these three recommendations that highlight the importance of thinking about information security.

Follow us

Copyright © 2016 ESET, All Rights Reserved.