Five alternatives to Bitcoin

Here’s a small selection of alternatives to Bitcoin – each of which has its own advantages. All of them share Bitcoin’s fundamental strengths, however – minimal or zero transfer fees, and freedom from traditional banking restrictions.

Fake Amazon gift cards offer only malware to Android devices

Fake Amazon gift cards are being sent to Android devices via text message, but it’s malware not discounts that is being spread among the recipients.

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

Toys “R” Us resets account passwords to counter stolen reward points

Account holders with Toys “R” Us have been informed that their passwords will be reset, after unauthorised third-parties attempted to gain access to the company’s reward program.

India blocks third party email services to government officials

The Indian government has changed the way in which its officials are allowed to operate when working, it has been announced.

Hillary Clinton used personal email for government business, putting security at risk

Hillary Clinton might be in hot water after it is revealed that she never had an official email account, but was instead using a personal one. That’s potentially a breach of federal law, but it’s definitely a security risk.

10 tips for protecting your virtual Bitcoin wallet

There have been some high-profile Bitcoin thefts recently. Here are 10 tips on protecting your virtual bitcoin wallet.

Uber security breach could leave 50,000 drivers exposed

As many as 50,000 Uber drivers could have been affected by a security breach last year, potentially leaving their personal data in the hands of an unauthorized third-party, reports Tech Crunch.

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

Tinder – Top 5 security tips

Digital dating has become more popular than ever because of apps like Tinder, but it’s not without risks. Stay safe by remembering the following tips.

Facebook rewards ‘white hat’ hackers with $1.3m bounty

Facebook has announced that it paid out $1.3 million last year to ‘white hat’ hackers, as part of a bounty initiative that rewards developers for spotting flaws in the social network.

Exploits: What are they and how do they work?

What is an exploit and why are they important?

Phishing, exploits and botnets – how can they affect your business?

How can phishing exploits and botnets affect a business?

WhatsApp – Top 5 security tips

WhatsApp is one of the most popular instant message apps in the world, but it’s not without security risks. Avoid the dangers with these 5 top tips.

Europol shuts down Ramnit botnet used to steal bank details

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

Lenovo website hacked, Lizard Squad claims responsibility

Chinese computer manufacturer Lenovo has been victim to a website hack, with Lizard Squad claiming responsibility.

FBI puts $3m bounty on Russian hacker

The FBI has offered a record $3 million reward for information leading to the arrest of a cybercriminal, reports the BBC.

Top 5 security resolutions for 2015

Follow these top 5 security resolutions from We Live Security to make for a safer 2015.

Nine bad botnets and the damage they did

Responsible for a great deal of the hacking, spamming and malware every day: here are some of the worst botnets of all time.

Anthem hack puts at least 8.8 million NON-customers at risk

Even if you’re not a customer of health insurer Anthem, your data could have been put at risk. Be on your guard.

Follow us

Copyright © 2015 ESET, All Rights Reserved.