New insurance policy covers cyberbullying

Cyberbullying and online abuse is a growing problem, and one insurance company is taking it so seriously that’s it’s willing to cover those who fall victim to harassment on the internet.

Moonfruit takes customers’ sites offline, as it prepares for DDoS attack

A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers’ sites offline, after receiving threats about an imminent internet attack.

The security review: Risky wearables, #CyberChoices and holiday shopping safety

You might already have mince pies on the mind as we countdown to Christmas, but cybercrime doesn’t sleep and neither should your security solutions. Here is this week’s security review – our recap of the biggest, most interesting stories and opinions from the past seven days.

Making devices secure this Christmas

Increasingly, on special occasions like birthdays and Christmas, parents are buying mobile and internet connected devices for their children. Our guide looks at how to make them safe before they are are unwrapped.

Data breaches ‘likely’ to affect consumer loyalty

A new survey of consumers from across the globe finds that data breaches have an impact on their trust in a business that has been the victim of a cyberattack.

12 tree-mendous security tips for Christmas

Tis’ the season to be jolly but Christmas is also a happy time of year for cybercriminals looking for their own gifts. We look at what you can do to ensure it’s only Santa that is allowed to bypass your security.

Microsoft issues warning after Xbox Live certificate ‘inadvertently’ leaks

A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.

UK govt could access and use smart toys to spy on suspects

The UK’s Science and Technology Committee has heard that it is possible for the government to remotely access and use smart toys to spy on suspects.

Tech support scams: 3 steps to conning unsuspecting victims

Tech support scams are “still big business”, ESET’s David Harley has previously said. In this guide we look at how fraudsters dupe their victims into handing over cash, while also corrupting their devices.

Cyber experts ‘in hot demand’

The demand for cyber experts is at a record high, with more firms eager to secure the services of experts to ensure they are safe from attacks. And they’re willing to pay top dollar.

MEPs agree to new EU-wide cybersecurity legislation

MEPs in the European Parliament have agreed on the need for EU-wide cybersecurity legislation, which will establish a common framework for all member states to subscribe to.

Safe, secure online shopping at home and on the go

At home, on the move, on a computer or via a mobile, online shopping habits have changed massively as technology as become more powerful. With Christmas around the corner, we look at some of the key details.

Copyright and social media

ESET’s senior research fellow David Harley explores and discusses the main issues surrounding copyright and social media.

Games with millions of users: How much about it do you really know?

Have you spoke to your kids lately? We bet if you have, then you are all too familiar with what they tend to talk about – video games. While you may still be clueless about the ins and outs, its worth reading up on online gaming, as there are plenty of risks you never knew possible.

Wearables: where’s the security risk?

At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For

Gary McKinnon reveals detail on NASA data breach and ‘extraterrestrial life’

In an recent interview, IT expert Gary McKinnon candidly revealed detail on his NASA data breach and finding documents on ‘extraterrestrial life’.

Hackers announce WWE’s Jim Ross is dead, after wrestling control of his Twitter account

Leeds United-loving football fans appear to have hacked the Twitter account of WWE legend Jim Ross, and announced his death.

Hacker Buba releases data belonging to customers of a UAE bank

Hacker Buba has released tens of thousands of records belonging to Invest Bank customers online.

The security review: VM machines and security, online banking and VTech data breach

The last seven days in information security have been notable to say the least, with VTech experiencing a major data breach and Google being the subject of a complaint over data gathering practices. Read on for more on both these stories, as well as other highlights of the past week.

GCHQ confirms that it hacks computers without ‘proper warrants’

The UK’s intelligence agency, the GCHQ, has finally admitted that it hacks into computers and other devices.

Follow us

Copyright © 2016 ESET, All Rights Reserved.