When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.
Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams – and why tablet and smartphone users need to stay alert.
Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.
Over the past two years, many online services have started to offer ‘two-factor authentication’ – an extra security measure which often requires a code from an app, or an SMS message, as well as a password. Our guide explains how, why and when to use ’2FA’.
‘Adware’, software which delivers unwanted adverts, isn’t as scary as some malware, but ESET’s analysis of Win32/Boaxxe shows that ‘malicious’ adware is becoming increasingly hi-tech and stealthy. Our guide will help you clean your machine – and see fewer unwanted ads.
Read how to protect yourself if you’ve been shopping with credit or debit cards (and who hasn’t?). As the scope of the latest cyber crime spree expands beyond Target and Neiman Marcus, malicious software is suspected.
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 – so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google’s OS…
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
Few things are sacred to today’ cybercriminals – and true love certainly isn’t one of them. Dating scams are a fast-growing area of cybercrime – rising by a third year-on-year in some countries, and ranging from fraud, to identity theft to malware attacks. Here’s how to stay safe.
Have you checked out the weekly podcast by ESET security researchers? It’s called the ESET Malware Report and it covers many security and privacy topics in handy 5 to 10 minute audio interviews.
For years, “encryption” has sounded like James Bond technology to many PC users – but new systems have made “crypto” technology easier to use, and a great way to protect the files you REALLY value.
Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.
Despite the heists against Bitcoin sites, plus high-profile law-enforcement actions against ‘dark market’ sites such as Silk Road, which conducted transactions in Bitcoin, the currency is soaring. We asked ESET experts, and finance advisors, for tips on how to stay safe.
The Internet is a vast source of information for all of us, and naturally some people use that information for good, and some for ill, like grooming and stalking children. So what things can you as a parent, teacher, or other concerned adult do to protect kids against online predators and solicitation?
Ransomware can be among the most frightening forms of malware – suddenly, your screen is replaced by a message from the police, demanding money, or a message saying your files are lost unless you pay a ransom to unlock them. Our tips will help you fight back.
On average, Windows PC users spend five days a year waiting for their machines to load – and the culprit for slow machines isn’t always malware. Here are a few tips to restore your grumbling old PC to top speed.
Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”. Thankfully, a few simple changes can make you safer – wherever you browse, and whatever you do.
Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work – a practise described as “Bring Your Own Disaster” by IT wags for years. Disasters, of course, DO happen – our tips should help you avoid being the guy who brings one.