latest posts

Instagram’s new API policy toughens access to its feed

Instagram’s new API policy makes it a lot harder for third party apps to gain access to its feed. News of this comes on the back of a malicious app harvesting its user’s details.

Fighting talk from Great Britain as it says it will hit back against internet attacks

British chancellor George Osborne has warned about the spectre of online terrorists attacking national infrastructure, and made some rather bold pronouncements about the UK’s willingness to engage in cyberwarfare to defend itself.

UK commits to new National Cyber Centre in 2016

The UK’s chancellor, George Osborne, has revealed that a new National Cyber Centre will be developed in 2016, helping the UK deliver a robust and centralized response to this growing threat.

Apple’s Tim Cook: There’ll be no backdoor in encryption

Apple’s Tim Cook has said in an interview with the Irish Independent that the idea of introducing backdoor access into encryption is ‘firmly off’ its agenda.

The security review: malware, child safety in the digital age and email security boost

Not quite sure what were the most interesting and intriguing information security stories of the past week? Not to worry – the security review has you covered.

Jail for British DDoS attacker, who said too much on Twitter

Although it’s far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty of people who have been put behind bars because of this modern-day crime.

Reclaim privacy with operational security says Snowden

Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.

7 things you need to know about car hacking

Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely to happen much more regularly in the future. We look at the top facts you need to know about this emerging trend.

Why continuous vulnerability assessments are necessary

The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.

Child safety in a digital age

Child safety in the 21st century is no longer about so-called real world concerns. In a digital age, parents now need to be aware of the risks that also exist online. Here are a few things to consider.

FastMail the latest victim of a sustained DDoS offensive

The premium email provider FastMail has revealed that a cybercriminal has launched multiple DDoS attacks on its systems and made a ransom demand.

Operation Buhtrap malware distributed via

The free version of Ammyy’s remote administrator software were being served a bundle that contained an NSIS installer used by the gang behind Operation Buhtrap.

TalkTalk braces itself for a huge cyberattack bill of £35 million

The cost of last month’s cyberattack on TalkTalk is likely to top £35 million, the company’s CEO, Dido Harding, has admitted in an interview.

Comcast resets 200,000 cleartext passwords that were up for sale online

Comcast resets customer account details after it found out that information was being sold on the dark web.

5 things you can monitor with your parental control tool

One of the biggest concerns parents have about the internet is the sites their children are browsing. Parental control tools can help allay this worry.

Social media savvy students ‘better at avoiding cybercrime’

A new study finds that current university students have a mature approach to social media that helps keep them safe from cybercrime.

£6.5 million CyberInvest initiative to boost UK’s cyberdefences

CyberInvest is the latest government initiative designed to boost the country’s leadership in cybersecurity.

The security review: Industrie 4.0, Schrödinger’s Cat and weakening encryption

This week’s roundup of the past seven days includes a interesting piece on Industrie 4.0, Schrödinger’s antivirus, proposals to weaken encryption and much more.

Nearly 157,000 TalkTalk customers had their personal details hacked

TalkTalk talks numbers – revealing that “only 4%” of its users were affected by the hacking attack on its systems.

ProtonMail hit with another DDoS attack

After experiencing an onslaught of DDoS attacks, which saw it hand over the ransom that was demanded, ProtonMail has once again been targeted by cybercriminals.

Follow us

Copyright © 2015 ESET, All Rights Reserved.