latest posts

Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft’s new OS

Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.

WordPress releases latest update with 4.2.4

Wordpress has announced its latest update, urging all users to download version 4.2.4 immediately.

Terracotta VPN network helps hackers remain anonymous

Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.

Lightbulb moment: Why the Internet of Things is a security watershed

Senior research fellow Righard J. Zwienenberg on why the Internet of Things could be *the* key security issue for the foreseeable future.

What is the core idea behind applying ISO 27001?

This article looks at the core idea behind applying ISO 27001.

Hacker sends woman pictures of herself from her own webcam

Hacker sends woman images of herself and her boyfriend, which were captured through their own webcam.

Hackers exploit OS X zero-day vulnerability

Hackers have exploited a zero-day vulnerability in the latest version of Apple’s OS X.

Indiana’s AG launches investigation into major data breach

Indiana’s Attorney General has launched an investigation into a data breach at Medical Informatics Engineering, which has affected up to 4 million people.

Black Hat 2015: What to watch out for, besides cars and guns

It’s not all about crashing cars and hacking guns: what’s hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.

The world’s biggest bug bounty payouts

From finding flaws to suggesting innovative security measures for the future, we look at some of the biggest bug bounty payouts in recent years.

Hacking Team and other breaches as security lessons learned

Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.

Facebook Security Checkup feature now available

Facebook has made a new feature called Security Checkup generally available after testing on an invite-only group, according to SoftPedia.

5 Systems Admin relationship tips (so you’re on talking terms again)

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences.

United Airlines customer flight records breached

United Airlines customer flight records have been lost in a data breach it has been reported.

Operation Potao Express: Analysis of a cyber-espionage toolkit

Operation Patao Express – Attackers spying on high-value targets in Ukraine, Russia and Belarus, and their TrueCrypt-encrypted data.

Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals

As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.

Cybersecurity is increasingly a ‘board-level’ issue, finds report

The majority of managers believe that IT risk management data genuinely influences board decisions, according to Gartner.

‘Keystroke Biometrics’ exploit defeats Tor privacy

Security researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy measures such as Tor.

Moonpig warns of password breach – but it may be more than their users who are at risk

Moonpig, the online personalised card company, has blocked the accounts of an unspecified number of customers after users’ details were published online.

How to shop online safely during the summer sales

The summer sales are upon us and there are plenty of good deals to be had online, but internet shopping is not without its dangers.

Follow us

Copyright © 2015 ESET, All Rights Reserved.