Top 5 tips for protecting your data when you travel

There are many things to remember before travelling and protecting your data is perhaps not the first thing on your mind. Follow these top 5 tips to stay reassured and keep your data secure.

Top 5 tips to avoid Ransomware

Ransomware is a malicious software that blocks your computer until you pay a sum of money. Here are 5 top tips to fight back and avoid being affected.

Cyber defense: businesses need to “spy on” cybercriminals to survive

The key to a good cyber defense strategy is to improve knowledge of current threats, and risks to businesses, according to law enforcement professionals speaking at London’s Infosecurity Europe 2014 conference in London.

No credit card required – Swedish shops let you pay in blood

At 15 payment machines dotted around the Swedish city of Lund, people can buy items without needing a card – or a phone equipped with a “Near Field” chip. All that’s required are the correct veins.

Business continuity management: key to securing your digital future

Business continuity management is the key to securing your company’s digital future despite disruptive incidents, from power outages and IT errors to fires, floods, tornadoes, earthquakes, and tsunamis.

Killer app? Lastpass on Samsung Galaxy S5 unlocks EVERYTHING with a fingertip

Samsung has upstaged rival Apple with a fingerprint-locked version of the password-vault app LastPass for its flagship Samsung Galaxy S5, available free on Google Play from today. One swipe unlocks ANY app or site on the phone.

‘Millions’ of users at risk after AOL email breach

Anyone with an AOL email address was urged to change their password and security questions this week after a cyber attack which compromised a “significant number of user accounts” – quoted by news agency Reuters as around 2% of all AOL accounts.

How to protect children from in-app purchase rip-offs

Parents who simply hand an iPhone or iPad to a child and let them play a favorite game risk children buying expensive in-game items. But the new version of iOS has some great defenses built in.

Android malware worm catches unwary users

An interesting new piece of Android malware has been spotted this week. The threat, detected by ESET security products as Android/Samsapo.A, uses a technique typical of computer worms to spread itself.

Heart-breaking – or side-splitting? Online video offers worst Heartbleed advice possible

Many mainstream news outlets offered advice on dealing with the Heartbleed bug – some misleading. This week, a spoof video has finally cut to the heart of the matter, and offered the worst advice imaginable on how to deal with the bug.

Facebook roller coaster accident video scam spreads fast – but don’t click

Posts promising gruesome footage of a roller coaster accident at Universal Studios in Florida in which 16 people supposedly died are spreading fast on the social network – with victims fooled into spreading the scam to their friends.

Windows XP Retires

Microsoft Internet Explorer zero day flaw will be even worse for XP users

Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.

Network structure must change to resist cyber attacks, warns Dr. Eric Cole

Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.

New iPad could be latest to add fingerprint security

New evidence has emerged that the new iPad will have fingerprint security built in, as found on the Apple iPhone 5S.

Top five tips for securing your web browser

The internet is there to be enjoyed, but first put your mind at rest by following these top five tips for securing your web browser

The perfect job? Dream on! Five signs a job offer is a scam

Job scams are a permanent fixture in cyberspace. Anyone who has posted their resume online has offered cyber gangs two crucial pieces of information – one, a way to contact them, and two, the fact they’re in need of a job.

Bad business: ALL major companies are hosting malware – Cisco

Every single one of 30 major companies tested by Cisco over the course of 2013 had malicious traffic on their networks, according to an annual report released by the company. Spyware and other malware was also growing rapidly on mobile devices.

Young people fear internet of things will give away their secrets

Young people are seriously worrried about connected gadgets when it comes to privacy – worrying that ‘connected’ gadgets such as Smart TVs could give away more data than they are comfortable with, according to a new survey.

Twitter awash in miracle diet pills spam onslaught

Twitter was flooded by an avalanche of spam from compromised accounts, leading to shortened links and pages promising miracle weight loss, diet pills, and products which would “change lives”. The attack appeared to have come via a third-party service connected to Twitter.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
our experts

Sébastien Duquette

Stephen Cobb

Graham Cluley

David Harley

Cameron Camp

Lysa Myers

Jean-Ian Boutin

Raphael Labaca Castro

Olivier Bilodeau

Robert Lipovsky

Marc-Etienne M.Léveillé

Aryeh Goretsky

Copyright © 2014 ESET, All Rights Reserved.