latest posts

The security review: Nemucod malware, Star Wars and China on cyber sovereignty

Our latest recap of the last seven days in information security includes the spread of the Nemucod trojan, the importance of improving awareness of online safety in children and young people and how Star Wars offers plenty of top cyber advice.

UK businesses ‘slow to respond to unusual network activity’

A new study has found that UK businesses, in comparison to their international counterparts, are slow to respond to unusual activity on their networks.

Star Wars: A New Hope – 5 information security lessons

If you are looking to boost your cybersecurity prowess, then make some time for the first Star Wars film, A New Hope. You’d be surprised at what this hugely popular and successful movie has to offer.

Australian parents’ concerns differ from kids’ actual behavior online

When it comes to protecting your children online, knowledge of risks is vital. With this in mind, ESET asked Australian parents about their main concerns.

Xi Jinping: Cyberattacks a global challenge

China’s president, Xi Jinping, has called on the international community to work together to fight cyberattacks, which he described as a global challenge.

Nemucod malware spreads ransomware Teslacrypt around the world

ESET has recently observed a huge increase in detections of the Nemucod trojan, a threat that usually tries to download another malware from the internet. Those detections ratios were very high in some countries.

How do you know if your smartphone has been compromised?

Many people are unaware of what measures they can take to identify malicious activity on their smartphone. We look at how at the key signs to be aware of.

Man arrested in connection with VTech data breach

Authorities in the UK have announced that a 21-year-old man has been arrested in connection with the major data breach at VTech in November.

Europol makes 12 arrests in Remote Access Trojan crackdown

Europol have been working alongside a number of European law enforcement authorities in an attempt to crackdown against the use of Remote Access Trojans.

Securing devices at Christmas: Wordsearch

Test your device security nous with our festive-inspired wordsearch. By the end of it, we reckon you’ll have a solid grasp of what’s required this Christmas.

5 things you need to know about connected toys

The current hype, this Christmas and beyond, is the connected toy. Not sure what that means? Well, here are seven things you need to know about this increasingly popular plaything.

New insurance policy covers cyberbullying

Cyberbullying and online abuse is a growing problem, and one insurance company is taking it so seriously that’s it’s willing to cover those who fall victim to harassment on the internet.

Moonfruit takes customers’ sites offline, as it prepares for DDoS attack

A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers’ sites offline, after receiving threats about an imminent internet attack.

The security review: Risky wearables, #CyberChoices and holiday shopping safety

You might already have mince pies on the mind as we countdown to Christmas, but cybercrime doesn’t sleep and neither should your security solutions. Here is this week’s security review – our recap of the biggest, most interesting stories and opinions from the past seven days.

Making devices secure this Christmas

Increasingly, on special occasions like birthdays and Christmas, parents are buying mobile and internet connected devices for their children. Our guide looks at how to make them safe before they are are unwrapped.

Data breaches ‘likely’ to affect consumer loyalty

A new survey of consumers from across the globe finds that data breaches have an impact on their trust in a business that has been the victim of a cyberattack.

12 tree-mendous security tips for Christmas

Tis’ the season to be jolly but Christmas is also a happy time of year for cybercriminals looking for their own gifts. We look at what you can do to ensure it’s only Santa that is allowed to bypass your security.

Microsoft issues warning after Xbox Live certificate ‘inadvertently’ leaks

A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.

UK govt could access and use smart toys to spy on suspects

The UK’s Science and Technology Committee has heard that it is possible for the government to remotely access and use smart toys to spy on suspects.

Tech support scams: 3 steps to conning unsuspecting victims

Tech support scams are “still big business”, ESET’s David Harley has previously said. In this guide we look at how fraudsters dupe their victims into handing over cash, while also corrupting their devices.

Follow us

Copyright © 2016 ESET, All Rights Reserved.