Election hacking FAQ: 2016 US presidential election edition

Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.

Snowden: 4 big security and privacy assumptions he undermined

ESET’s Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.

VMworld: The year of the developer

At VMworld there are a bewildering number of technologies trying to integrate in order to provide your data to entire networks, reports ESET’s Cameron Camp.

VMworld: Can you trust your API?

All too commonly API security is something of an afterthought, says ESET’s Cameron Camp at this year’s VMworld. This needs to change.

VMworld: Do you know where your data is?

VMworld this year feels like a confessional – operators coming clean about their lack of data visibility, heads hung in shame, says ESET’s Cameron Camp.

Car hacking: Defcon style

This year at Defcon, the car hacking village is bigger than ever, says Cameron Camp. Key observation? The tools are getting better.

Black Hat 2016: When middleware takes over the world

In years past at Black Hat here in Las Vegas, there was row after row of hardware, then, in later years, row after row of software – Now there’s row after row of middleware.

Comic-Con: Travel, safety and privacy guide

Ahead of this year’s Comic-Con in San Diego, ESET’s Aryeh Goretsky has put together a handy travel, security and privacy guide.

Interop: Getting a few more years out of your tech

Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no one could figure out what to do with a hard drive “that large”.

The Four “A”s of Account Management

It’s said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!

Apple and ‘exceptional access’ to crypto protection

Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.

CES 2016: Day 3 – the drones are back (but with augmented reality)

The final instalment in Cameron Camp’s security-focused coverage of CES 2016, looks at the future of drones. It’s all about augmented reality.

CES 2016: Day 2 – making smarter cars

Car security is rising to the fore here at CES 2016, which is not altogether surprising as 2015 was the year when car hacking really crossed over into the mainstream.

Should I stay or should I go … to Windows 10?

It has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to this latest release of Microsoft’s flagship operating system is going to be on the minds of administrators for 2016, says ESET’s Aryeh Goretsky.

CES 2016: Day 1 – surviving the swarm

As ever, ESET is once again in attendance at CES in Las Vegas, offering you expert insight into all the security aspects of this year’s show, which, from what have seen so far, is a key focus for CES in 2016.

Copyright and social media

ESET’s senior research fellow David Harley explores and discusses the main issues surrounding copyright and social media.

Wearables: where’s the security risk?

At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For

Virtual machine security – offloading the endpoint

If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even enter the endpoint, asks ESET’s Cameron Camp.

Birds of a feather code together

Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security – while there is much to be done, there’s a lot to be optimistic about she says.

Are healthcare organizations ready to get serious about security … now?

ESET security researcher Lysa Myers looks at a few of the questions she has been hearing more often about the recent surfeit of insurer breaches.

Follow us

Copyright © 2016 ESET, All Rights Reserved.