tag
security

Global Cyber Security research hub to be set up at Oxford University

A new Global Center for Cyber Security at the University of Oxford will coordinate international work on cyber threats and cyber security. The Center will receive £500,000 ($766,000) in UK government funding every year.

Could we ‘think’ the passwords of the future? Study finds brain-reading tech is cheap, accurate and secure

The idea that we might ‘think’ passwords instead of typing them sounds like science fiction – but a team of UC Berkeley School of Information researchers has proved that it can work, using existing ‘mind reading’ headsets.

Even IT security professionals reuse passwords – with 81% admitting to risky habit

Up to 81% of computer security professionals reuse passwords across multiple applications, violating security best practice

PayPal warns of security crisis over new domain names

PayPal has warned of a looming security crisis if new top-level domains such as .bank are brought into use later this year.

British cyber intelligence agency admits to basic password security errors

Britain’s hi-tech government intelligence agency GCHQ should know better than to send passwords in plain text via email – but has been doing so due to “legacy systems”, it admitted in a statement this week.

James Bond steps in to defend British businesses against cyber attack

British cyber security experts from intelligence services such as MI5 are to join forces with 160 top British firms to defend against cyber attacks.

Free AV and relying on the luck of the Irish

ESET Ireland’s Urban Schrott has blogged recently that “Research reveals nearly half of all Irish computers depend on free antivirus for protection”.

Straight facts about Mac malware, threats and responses

Does your Apple Mac need antivirus software, or any other kind of security software? This question has been asked repeatedly over the years and I think the “correct’ answer has changed over time.

Your Apple Mac made even safer: Part 3 of securing new devices

If you recently acquired an Apple Mac computer there are several simple steps you can take to protect your new machine, and all of the valuable information you will be storing on it.

Securing Your Holiday Tech Gifts, Part 1: Windows PC Guide

[UPDATE #1:  (21 Dec 2012, 5:30PM) ESET Researcher Cameron Camp has just published the second part of this series on securing your Android device.  Read it here on the ESET Threat Blog at Securing Your Holiday Tech Gifts, Part 2: Android Guide.  AG] December is upon us, and whether you have a Christmas tree, menorah,

Guarding against password reset attacks with pen and paper

With the recent announcements of password breaches at LinkedIn, and warnings from Google about state-sponsored attacks on Gmail accounts, it seems like a good idea now to review some password security basics.  In this blog post, we’re going to take a look at a rather low-tech solution to a decidedly high-tech problem:  How to guard

Phishing Using HTML and Intranet Security Settings

Phishers always try to find new ways to bypass security features and trick ‘educated’ users. Over the years we have seen simplistic phishing attempts where the required information had to be typed into the e-mail body. This worked at that time because phishing was new and hardly anyone had a notion of the implications. Later,

Digital Certificate Security: Time to check protection of these valuable assets

An emerging information security threat highlighted this week by Róbert Lipovský, namely theft and abuse of digital certificates by malware creators, serves as a timely reminder that these certificates are highly valuable digital assets that should be accorded the highest levels of protection. If your company uses certs purchased from root authorities such as Verisign,

Facebook Video Calls powered by Skype

With Facebook’s launch of video chat powered by Skype underway and enabling a new level of communication on its platform, we take a look at permission settings and privacy options.

LinkedIn Privacy: An Easy How-to Guide to Protecting Yourself

Introduction LinkedIn is a social network platform whose specialty is connecting professionals together to build relationships and create business opportunity. Recently the company became publicly traded and grabbed the attention of the world as its initial public stock offering more than doubled on the first day. Here we focus tools and options for user privacy

The Social Networking/Cybersafety Disconnect

Survey Reveals Chasm between Users’ Concerns and Behavior A recent Survey commissioned by ESET and conducted online by Harris Interactive from May 31-June 2, 2011 among 2,027 U.S. adults 18+ found a startling disconnect between user concerns about privacy and security and their actions on social networking sites. To start, the study found that 69%

Fake Windows Updates Are Easy to Avoid

Our friends (and competitors) at Sophos blogged about a new threat that poses as a Windows Update and then infects unsuspecting users with a fake antivirus product. The update appears to be very real and is tricking users. While my colleagues at Sophos offer excellent advice to help people protect themselves (as I believe we

An ethical dilemma

Update: It seems like the initial article is inaccurate and that Paul Rellis never made any such comments about a 14 year old breaking into the X-Box live servers and have not offered to mentor him http://kotaku.com/5805742/microsoft-is-helping-an-xbox-live-hacker-develop-his-talent TekGoblin reports (http://www.tekgoblin.com/2011/05/27/14-year-old-call-of-duty-hacker-hired-by-microsoft/) that a teenager who broke into the Call of Duty Modern Warfare 2 gameservers last

Facebook Privacy: An Easy How-to Guide to Protecting Yourself

Introduction As the sun is setting and I breathe some of the night time air I am inspired to write about Facebook.  Yes, *the* Facebook, the third largest country if it were a physical place with boundaries under a common rule of law and government.  When many people use a service such as this, it

LinkedIn Security and The Rapture

What do these two topics have in common? More than you might think. The obvious is that neither has arrived yet. There is no proof of existence of either, you have to take it on faith. Neither will be here tomorrow… take my word for that. A story at http://www.reuters.com/article/2011/05/23/uk-linkedin-security-idUSLNE74M02820110523 explains how dreadfully poor security

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
10 Apr 2013
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.