latest posts

Shipping industry gets its first set of cybersecurity guidelines

A number of leading shipping organizations have developed a set of cybersecurity guidelines to help the industry combat this growing threat.

Consumers ‘cautious about IoT device security’

While the hype around the Internet of Things (IoT) is warranted in many respects, consumers are nevertheless cautious about adopting the technology, a new survey suggests.

BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry

The recent attacks on the electrical power industry in Ukraine are connected to attacks on the media and to targeted cyber-espionage attacks against Ukrainian governmental agencies.

Microsoft to alert users to state-sanctioned cyberattacks

Microsoft has revealed that it will notify its users to inform them that their account has been targeted or compromised by a state-sanctioned cyberattack.

BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry

The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014, was also active in the year 2015.

5 things you need to know about social engineering

Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. However, little is known about this tactic. This feature discusses some key aspects.

Ransomware rearing its ugly head, goes after business

Ransomware is the latest tool in the cybercriminal’s arsenal, but it has to date largely been used to target consumers. Could it now be used to hit banks and other financial institutions too?

Why online gaming is the new frontier for cybercrime

Online gaming and cybercrime are more connected than you might think. We explore how online games are becoming the new hunting ground for cybercriminals looking to earn and learn.

Google testing password-free account sign-in

Google has announced that it is piloting a new sign-in system that will, if successful, replace passwords. User authentication will be delivered through a smartphone.

ESET predictions and trends for cybercrime in 2016

It’s that time of the year when the information security industry takes part in its annual tradition: coming up with cybercrime predictions and trends for the next 12 months.

UK police service ‘needs to better grasp the scale and impact of digital crime’

A new study from HMIC concludes that the police service in the UK needs to better understand the scale and impact of digital crime.

IT manager has his bikes stolen after cycling app reveals his home address

British IT manager Mark Leigh is rueing the day that he was careless about information he shared without thinking via a smartphone app because – he believes – it ended up with him having two bikes stolen from his garage.

Quantum cryptography ‘is vulnerable to attack’

Swedish researchers have found that quantum cryptography, via energy-time entanglement, is vulnerable to being exploited by an attacker.

Employees ‘the biggest threat’ to enterprise cybersecurity programs

A new survey finds that the majority of corporate information security practitioners consider employees to be the biggest risk to their company’s cybersecurity program.

Apple continues to defend encryption

Apple’s Tim Cook has once again defended encryption, explaining that the introduction of a backdoor would create vulnerabilities and leave devices exposed to threats.

The security review: Nemucod malware, Star Wars and China on cyber sovereignty

Our latest recap of the last seven days in information security includes the spread of the Nemucod trojan, the importance of improving awareness of online safety in children and young people and how Star Wars offers plenty of top cyber advice.

UK businesses ‘slow to respond to unusual network activity’

A new study has found that UK businesses, in comparison to their international counterparts, are slow to respond to unusual activity on their networks.

Star Wars: A New Hope – 5 information security lessons

If you are looking to boost your cybersecurity prowess, then make some time for the first Star Wars film, A New Hope. You’d be surprised at what this hugely popular and successful movie has to offer.

Australian parents’ concerns differ from kids’ actual behavior online

When it comes to protecting your children online, knowledge of risks is vital. With this in mind, ESET asked Australian parents about their main concerns.

Xi Jinping: Cyberattacks a global challenge

China’s president, Xi Jinping, has called on the international community to work together to fight cyberattacks, which he described as a global challenge.

Follow us

Copyright © 2016 ESET, All Rights Reserved.