category

Uncategorized

NICE news about the cybersecurity skills shortage (and a call for papers)

The cybersecurity skills gap is a security problem and in the US the National Initiative For Cybersecurity Education (NICE) is seeking to reduce that gap.

Hacking Team and other breaches as security lessons learned

Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.

Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals

As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.

Hackers demo Jeep security hack

Hackers have demonstrated an exploit that can take remote control of a Jeep, to the extent of cutting the transmission and controlling the throttle.

What I learned at Cyber Boot Camp (Instructor Edition)

Teaching computer security to highly motivated students at Cyber Boot Camp reveals a lack of basic computer science education in California Schools.

New Facebook scam promises “shocking video,” but contains only malware

When you see what this Facebook clickbait really links to, your jaw will drop.

National Small Business Week: a cybersecurity survival guide

It’s National Small Business Week in the U.S. and, because properly protecting the digital assets of your small business could be vital to its success, here’s a cybersecurity survival guide.

Lawyer claims police placed malware on requested external hard drive

A lawyer in Arkansas is claiming that police planted three different pieces of malware on an external hard drive in a controversial whistleblower case against the police force, reports 5 News Online.

Advanced Persistent Threats: Using multi-layered detection to defend against APTs

Advanced persistent threats (APTs) are a growing concern to the world’s companies and networks. This recorded webinar looks at real-world data breaches resulting from APTs and how multi-layered proactive detection can combat this threat.

Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP

A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.

Fer O’Neil: Say What? Required contents of notice in data breach notifications

With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver useful, readable content, other than a general warning to remain vigilant?

U.S. tax identity theft: dodging the $5 billion crime spree

Tax Identity Theft Awareness Week? Yes, tax ID fraud is a real threat to your finances in America today. Putting your tax refund in jeopardy is just one of the impacts.

Mobile health IT security challenge: way bigger than HIPAA?

Wearable technology and other health-related devices were big at the 2015 Consumer Electronics Show (CES) earlier this month. This recorded webinar explains why these and related technologies present big challenges for data privacy and security.

Target breach 12 months on: a year of lessons learned

The Target hack that was revealed one year ago today brought new levels of awareness to the problem of cybercrime. Today we review the case and its impact. To go straight to the lessons learned, click here. The Big One: Target “Nationwide retail giant Target is investigating a data breach potentially involving millions of customer

G20 2014 Summit Lure used to target Tibetan activists

APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.

Top Cyber Security Awareness Month themes, topics, and resources

National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).

Five million Gmail credentials posted online

Some five million people who used their Gmail address as a user name had their passwords published by someone who apparently thinks that’s a cool thing to do. Changing you Gmail password now is a good idea.

Data breach – European bank’s info “held to ransom”

The European Central Bank has revealed that information including email addresses and contact data has leaked in a data breach – and that the unknown attackers demanded “financial compensation” from the bank in return for not releasing the information, according to the BBC’s report.

Free Wi-Fi offered by smartphone networks poses “serious threat” new report warns

Smartphone users are at risk from bogus hotspots set up to harvest login details on networks such as AT&T – and the fake hotspots can easily be created on devices as small as an Android phone, a new report warns.

Catch the ESET 2014 Mid-Year Threat Report broadcast

With the first half of the year almost over, it’s time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar, this one hour event will look at some of the more interesting pieces of malware and Internet security threats that have occurred during the first six months of the year.

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

6 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2015 ESET, All Rights Reserved.