category
How To

Target breached: 5 defensive steps shoppers should take now

Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.

Exploit Protection for Microsoft Windows

we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen their defenses.

When it just doesn’t click: How to date online without being scammed

Few things are sacred to today’ cybercriminals – and true love certainly isn’t one of them. Dating scams are a fast-growing area of cybercrime – rising by a third year-on-year in some countries, and ranging from fraud, to identity theft to malware attacks. Here’s how to stay safe.

Can you hear us now? ESET researchers podcast every week

Have you checked out the weekly podcast by ESET security researchers? It’s called the ESET Malware Report and it covers many security and privacy topics in handy 5 to 10 minute audio interviews.

Why “crypto” isn’t just for spies: A beginner’s guide to keeping secrets

For years, “encryption” has sounded like James Bond technology to many PC users – but new systems have made “crypto” technology easier to use, and a great way to protect the files you REALLY value.

Why your small business needs an information security policy and a WISP

Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.

Cash – or crash? Tips and tricks for using Bitcoin safely

Despite the heists against Bitcoin sites, plus high-profile law-enforcement actions against ‘dark market’ sites such as Silk Road, which conducted transactions in Bitcoin, the currency is soaring. We asked ESET experts, and finance advisors, for tips on how to stay safe.

How do we protect kids from online predators?

The Internet is a vast source of information for all of us, and naturally some people use that information for good, and some for ill, like grooming and stalking children. So what things can you as a parent, teacher, or other concerned adult do to protect kids against online predators and solicitation?

Don’t pay up! How to avoid ransomware threats – and how to fight back

Ransomware can be among the most frightening forms of malware – suddenly, your screen is replaced by a message from the police, demanding money, or a message saying your files are lost unless you pay a ransom to unlock them. Our tips will help you fight back.

Clean up, speed up: How to make your PC run faster

On average, Windows PC users spend five days a year waiting for their machines to load – and the culprit for slow machines isn’t always malware. Here are a few tips to restore your grumbling old PC to top speed.

Five bad PC habits many of us STILL have – and how to stop today

Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”. Thankfully, a few simple changes can make you safer – wherever you browse, and whatever you do.

BYO-Doh! How not to be the “bring your own disaster” guy

Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work – a practise described as “Bring Your Own Disaster” by IT wags for years. Disasters, of course, DO happen – our tips should help you avoid being the guy who brings one.

Live fast, die old: Pro browsing tips to enjoy the Web at full speed (and safely too)

Malware, phishing and ID thieves are everywhere – but you don’t have to be paranoid, or hang back, or stop yourself enjoying the best the web has to offer. Our tips should help you browse with confidence.

Remote Desktop (RDP) Hacking 101: I can see your desktop from here!

With malicious remote access attacks of the rise it is time to check your computer’s RDP configuration and apply restrictions, like turning it off, limiting users,and applying strong passwords.

A scam-spotters guide: Ten things your bank will NEVER do – but cybercriminals will

These days cybercriminals will use phone calls, SMS messages, emails, fake apps – and even couriers – in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” – and catch phishers and fraudsters in the act.

Encryption advice for companies in the wake of Snowden NSA revelations

What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available encryption? For a start, you should not stop using encryption, but you may want to review how you use it moving forward, Stephen Cobb explains.

Comment/No Comment: a word about blog comments

After taking quite a long break from comment moderation on the WeLiveSecurity blog, I’ve recently started receiving comment notifications and have therefore been able to moderate some of the comments that have I’ve seen, and I thought it was worth passing on some thoughts about the moderation process as I see it. I should make

In a rush? Five two-minute tips to make yourself more secure right now

Performing a “cyber spring clean” can be time-consuming – but many of us have a few weaknesses we can tighten up in two minutes or less. Here are a few “instant fixes” for problems you might have overlooked…

Big phish, small pond: How to stay safe from SMS phishing scams

Phishing emails are a sad fact of life, and most of us are used to dealing with them – but cybercriminals are increasingly turning to SMS to reel in their victims. Our tips should help you avoid clicking something you’ll regret.

How to keep children safe online (without looking over their shoulders all day)

Children come into contact with the internet at a very young age these days – a survey on a parenting site this year said that one in eight children go online before the age of two. Our tips will help keep youngsters safe – and help them enjoy the internet.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
19 Dec 2013
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.