category
How To

How to protect your identity at school

Young people are targeted for data theft at 35 times the rate of adults – they are considered an easy target for both digital and physical theft. You can make going back to school an easier transition by ensuring your data and devices are secure both at school and at home.

Facebook scams – the ‘classics’ and how to avoid them

But some things on Facebook haven’t changed – namely, the scams. It’s not that cybercriminals are unoriginal – it’s just that there are a few Facebook scams which work again and again. Here’s why.

Gamescom 2014: World of Malware?

The gaming industry keeps growing, and the crowds at Cologne’s Gamescom 2014, show why big game titles are rapidly becoming a target for cybercrime. Our tips will help you enjoy the latest games – without hackers declaring ‘Game Over’.

Is your Point of Sale machine protected against attacks?

Criminals are very interested in retailers’ Point of Sale (PoS) machines. Recently, a new type of malware has been found that specifically tries to break into PoS machines, called Win32/BrutPOS.A.

Wi-Fi security – the new ‘bulletproof’ router (and how to toughen yours)

A new project aims to protect homes and small businesses from the security failings of Wi-Fi routers, a problem which has repeatedly hit the headlines over the past year.

Comic-Con 2014: Eight super-powered digital safety tips

Over the past few years, Comic-Con has had over 130,000 attendees, and those attendees tend to be very digitally literate – so that means we will probably see double that number of connected devices – laptops, tablets, smartphones and perhaps even tricorders.

Facebook settings – five steps for better privacy and security

Facebook has faced repeated controversy over privacy, with features such as Graph Search revealing information which users might have forgotten they ever “shared”. But there are steps users can take to manage the way Facebook uses their information.

World Cup scams: team tactics to keep you safe

With the World Cup in Brazil poised to begin, the whole world is watching – and that includes cybercriminals. Here’s the latest on scam sites, phishing and how to enjoy surfing safely during the competition.

Android malware: how to keep your device safe from filecoders (and everything else)

When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.

Router attacks: Five simple tips to lock criminals out

Cybercriminals always look for the weakest link when planning their attacks – and failings in home routers can allow another “way in”. A few simple adjustments will keep yours safe.

Don’t forget flash: memory cards can be a data loss and infection vector

A reminder that malicious code can be spread via flash memory cards like SD cards, just as easily as it can spread on USB flash drives. Check these tips to get protected.

Business continuity management: key to securing your digital future

Business continuity management is the key to securing your company’s digital future despite disruptive incidents, from power outages and IT errors to fires, floods, tornadoes, earthquakes, and tsunamis.

Taxing Times: Dealing with tax identity fraud in America

Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it does happen, all too often. Here’s why, and what you can do about it.

5 Tips for protecting Windows XP machines after April 8, 2014

Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.

Master of Mavericks: How to secure your Mac using Apple’s latest update

Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all Mac users can update to the latest version freely (providing their machine is up to the new software – which Apple allows you to check here). But under the bonnet of Mavericks lurk

Five tips to help control your privacy on Mac OS X

Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.

Tips for protecting against sextortion

It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.

Five ‘new friends’ to avoid like the plague on social networks

Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack – and on LinkedIn, talking to the wrong ‘recruiter’ can lead to disaster.

How can we as patients secure our medical data?

When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.

Smells phishy? New email scams – and why smartphone users need to stay alert

Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams – and why tablet and smartphone users need to stay alert.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.