Google Drive security boost for paying customers

Google has announced that organizations that pay for Google Drive will reap the benefits of a more secure platform.

VMworld: When IT grows up

Virtualization aims to totally change how we think of IT altogether. Against the backdrop of VMworld, we take a closer look at the key details.

Public Wi-Fi security: Your questions answered

We look at the five top questions you should be asking before connecting to public Wi-Fi – while convenient, there are risks.

Bitcoin community ‘needs to collaborate’ over security and scalability

In an open letter to members of its own community, Bitcoin developers and contributors have called for greater cooperation over security and scalability.

10 steps to staying secure on public Wi-Fi

The convenience of public Wi-Fi for many people is invaluable, yet there are risks. With all this in mind, here are 10 tips to staying safe.

VMworld: VM acceleration – how do we get there?

If you have a ton of VMs sprawling the globe, how do you make them all fast? That’s the subject floating around the show floor at VMworld in SFO this year.

VMworld: Got a ton of VMs? Now what?

This year VMworld tackles what happens when your VM farm grows up and spawns hundreds or thousands of baby VMs

8 security tips for gamers: go play with no worries!

It is possible to enjoy videogames by applying practical security measures that will keep us safe. In this article, we look at 8 security tips.

Nine out of ten parents worry about kids online − yet few act

The internet is arguably the new frontier for communication, collaboration and business but, with criminals also using it for ill-gotten gains, it does have its bad parts too. And this is making life difficult for parents struggling to keep up with their child’s technology obsession.

How did the Internet change the everyday work of a security researcher?

Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet’s impact on security research.

How can businesses save money on internet security in 2015?

A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.

Top Cyber Security Awareness Month themes, topics, and resources

National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).

Salesforce software – millions of users at risk of Dyre malware

A strain of malware which previously targeted banks has turned its attention to users of the popular Customer Relationship Management (CRM) software Salesforce, used by 100,000 organizations worldwide.

Week in security: FBI malware, billion password leak – Chinese hotel goes mad

With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week – but revelations about FBI malware and a trove of a billion passwords inspired furious debate too.

Week in Security: Tor in turmoil, USB ports in a storm, Android app attack

This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.

Data breaches in New York have tripled

Data breaches have hit a record high in the state of New York, tripling since 2006, according to records released by the state attorney general.

Facebook settings – five steps for better privacy and security

Facebook has faced repeated controversy over privacy, with features such as Graph Search revealing information which users might have forgotten they ever “shared”. But there are steps users can take to manage the way Facebook uses their information.

“Hacking” cars on the road wirelessly is easy, claims expert

It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into a fatal crash, says a car security specialist – saying that the 100-or-so computers in “connected” cars are vulnerable to attack.

Myths of the Target Breach

One of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.

Why are so many kids still not receiving computer science education?

The city of Chicago recently announced a change to the curriculum for schools in their district that would introduce children as young as primary school to computer science concepts. It would also allow students to count computer science as a core subject that fulfills graduation requirements. What does this say about the current state of computer-related education?

Follow us

Copyright © 2015 ESET, All Rights Reserved.