Google is looking to deliver even greater transparency when it comes to online security by identifying publicly – or “marking”, as it puts it – websites that are not as secure as they should be.
WeLiveSecurity takes a look back at the life of the programming pioneer US Navy Rear Admiral Grace Hopper, who changed the world of technology.
In this feature, ESET’s Denise Giusto Bilić offers a detailed overview as to how to avoid certificate pinning in the latest versions of Android.
OPM has been criticized by the House Oversight and Government Reform Committee for security shortcomings, which contributed to 2015’s major data breach.
Variety has confirmed that its content management system (CMS) was hijacked on the weekend by the hacking collective OurMine.
Be wary of CEO fraud, a modern take on deception specifically designed to trick you into doing something that you think you have permission to do.
18 years of Googling is certainly something to behold, but on this anniversary, ESET’s Ondrej Kubovič is keen to highlight the cybersecurity threat.
Improving financial cybersecurity at an international level must be a key agenda item at the G20 Summit in China this month (September 4th-5th).
ESET has carried out analysis of new samples of the crypto-ransomware family TorrentLocker, to compare the 2016 campaigns against its research in late 2014.
This piece looks at the five threats online gamers face and what they can do to protect themselves. It’s important to be wary of these to stay safe and secure.
During the last hours, OSX/Keydnap was distributed on a trusted website, which turned out to be “something else”. It spread via a recompiled version of the otherwise legitimate open source BitTorrent client application Transmission and distributed on their official website.
21st century cybercriminals are more sophisticated, daring and organized than ever. The threat landscape has evolved.
Detected by ESET as Android/Twitoor, this malware is unique because of its resilience mechanism. Instead of being controlled by a traditional command-and-control server, it receives instructions via tweets.