SMB Security Basics

Implementing security measures can help ensure you don’t become a statistic, and it doesn’t have to be expensive. Get tips from the experts at ESET. During this podcast, you’ll learn: Tips for boosting security on a limited budget How a security consulting service can save you money Common mistakes to avoid along the way

5 Tips for protecting Windows XP machines after April 8, 2014

Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.

The Internet of Things isn’t a malware-laced game of cyber-Cluedo… yet

Will the future be a murderous game of ‘smart device’ Cluedo, where Colonel Mustard meets his death at the hands of a Wi-Fi pacemaker, and Miss Scarlett is consumed in a Smart Home-ignited blaze. Not likely, says David Harley – where’s the profit motive?

Channel Cybercrime: Bug allows hackers to hijack screen of Philips TVs

Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter.

PRISM-proof system could turn servers into spook-proof fortresses

A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues – and even against the hi-tech tentacles of government organizations with “back doors” into corporate servers.

Sniffing earwax could offer icky new frontier in biometrics

For most of us, earwax is a bodily product we prefer not to think about, but a team of scientists have discovered that the substance reveals a huge amount about its creator – and could even be used to identify people.

Tumblr adds “nuclear defense system” (well, 2FA) to shield users

Popular blogging service Tumblr has become the latest web giant to add two-factor authentication as an “extra layer” of security for users – describing its new measure as a “nuclear defense system” armed with twin keys.

What to do if your password is leaked

If disaster strikes and your password is leaked, don’t panic! We Live Security has a simple guide to help limit the damage.

Top 5 security tips for online shopping

Online shopping is fast, easy and convenient, but is it safe? Stay secure with We Live Security’s Top 5 tips.

Time to Move On From Windows XP

Windows XP comes to an end of sorts on April 8, 2014. After this, Microsoft will cease providing security updates or support for this venerable operating system. ESET discusses implications and resources.

Better Mac Testing: Static versus Dynamic Testing

Dynamic or on-access Mac testing of AV products is problematical with samples for which Apple has implemented signature detection.

How to make safer online payments

Paying for things online is as easy as clicking a mouse, making online stores are a logical target for cybercriminals. Make safer online payments with this guide from We Live Security.

Mark Zuckerberg invests in CAPTCHA-crushing AI which “thinks like a human”

Mark Zuckerberg, Paypal founder Elon Musk and Ashton Kutcher have invested $40 million in an artificial-intelligence start-up, Vicarious, which can already ‘read’ CAPTCHA codes – and aims to mimic functions of the human brain.

President Obama’s BlackBerry survives assault from Korean Androids

Contrary to reports late last week, the BlackBerry smartphones used by White House staffers and the President are not to be replaced by Android or Windows Phone handsets from Korean manufacturers LG and Samsung.

Bitcoin fixes Mt Gox theft bug – as exchange staff find 200,000 BTC in ‘forgotten’ wallet

Bitcoin’s developers have released a new version of the software, which includes a long-awaited fix for the “transaction malleability” bug which is said to have brought down the Mt Gox exchange – and Mt Gox staff have ‘found’ 200,000 BTC in an abandoned wallet in the exchange.

Google encrypts ALL Gmail to keep snoopers out

Starting today, Gmail will use an encrypted HTTPS connection to check or send email, regardless of what platform users employ to access the service – and will use security measures when moving mails internally, citing fears over government snooping.

HIMSS Conference 2014 Insights

Master of Mavericks: How to secure your Mac using Apple’s latest update

Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all Mac users can update to the latest version freely (providing their machine is up to the new software – which Apple allows you to check here). But under the bonnet of Mavericks lurk

Stealth malware sneaks onto Android phones, then “turns evil” when OS upgrades

A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS – allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.

Target breach optioned as Sony feature film

The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as a feature film by Sony. The studio bought the rights to the New York Times article, “Reporting From the Web’s Underbelly,” with a view to creating a “cyber thriller.”

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Graham Cluley

Stephen Cobb

David Harley

Marc-Etienne M.Léveillé

Lysa Myers

Aryeh Goretsky

Robert Lipovsky

Bruce Burrell

Sébastien Duquette

Oh Sieng Chye

Copyright © 2014 ESET, All Rights Reserved.