The end of mainstream support for Windows 7. Learn from past mistakes

The end of mainstream support for Windows: Don’t repeat the mistakes of the past, and be prepared. Especially if you’ve only just got rid of all the Windows XP computers in your company.

Corel vulnerabilities could allow hackers in via DLL hijacking

Many of Corel’s photo, video and media editing programs contain DLL hijacking vulnerabilities, a security researcher has discovered.

Swiss bank data released by hackers

The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to pay the ransom demanded by the attackers

2015: The cybersecurity threatscape for the year ahead

Presenting a recorded webinar that seeks to answer this question: How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves?

Thunderstrike! How a radar-proof rootkit could infect your Mac

A security researcher describes how malware could infect your Mac’s boot ROM, and spy on your activities, with little chance of you ever realising.

Obama to propose legislation that protects firms sharing cyberthreat data

President Barack Obama is planning to push legislation which would protect companies from lawsuits for sharing cyberthreat data with the government, reports the Washington Post.

Vulnerability found in AMD processor firmware

A vulnerability found in certain AMD processor firmware has been patched by the company it was revealed at the 31st Chaos Communication Congress.

Hacked routers used for paid DDoS attacks

The rent-a-DDoS service that knocked out Xbox Live and Playstation Network is powered by thousands of hacked residential internet routers.

British Prime Minister wants access to messaging apps

British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies

Do you really need antivirus software for Linux desktops?

It started, innocently enough, as a question asked in the ESET Security Forum titled “Eset – Do I Really Need Antivirus On My Linux Distros?” However, the answer to that seemingly simple question on Linux antivirus is more complex than a simple yes-or-no response.

US military’s CENTCOM Twitter account hacked – were they not using 2FA?

Twitter and YouTube accounts run by the US military’s Central Command are hijacked by hackers claiming to back Islamic State.

Microsoft to end free Advance Security Notifications

Microsoft is changing the way it distributes its Advance Notification Service, and will no longer make the security bulletins publicly available, according to eWeek.

Anonymous hackers ‘declare war’ on al Qaeda and Islamic State

The Anonymous hacking collective has “declared war” against the terrorists said to be responsible for the shootings of staff at France’s satyrical Charlie Hebdo magazine, reports The Telegraph.

‘Critical Security Updates’ cancelled for 939 million Android users

Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software

Obama calls for 30 day data breach notification and greater student privacy

President Barack Obama is today to propose legislation that would ensure companies inform customers of any leaks within 30 days of a data breach, reports Physorg.

Top 5 tips for safer Paypal payments

Paypal is one of the safest ways to make online payments, but there can still be security breaches if you’re not careful. Keep in mind these top 5 tips when paying online or sending money to your contacts

Ello Privacy – What you need to know

Ello Privacy was launched in March 2014 as an ad-free social network alternative, however the site still needs access to your personal data. Here’s the lowdown on the network’s key privacy principles.

How to transfer your data from iPhone to Android

Transferring all your data from iPhone to Android may seem like a hassle, but these 5 simple tips will make the transition a lot easier.

The drones are coming, what could go wrong?

Continuing from Consumer Electronics Show 2015 here in Las Vegas where we were covering this week the first impresisions of the show and also some lessons that this digital invasion is leaving us. Now, we will approach another interesting topic that involves privacy and new technology: drones.

Internet of Things Privacy: FTC chairwoman warns of risks

The Chairwoman of the Federal Trade Commission has offered stern warnings of privacy in relation to the Internet of Things in her opening remarks at CES 2015, reports SC Magazine.

Follow us

Copyright © 2015 ESET, All Rights Reserved.