The biggest cyber security problem large companies face could be employees – a survey reveals that nine out of ten employees knowingly ignore or violate their company’s data policies.
China and the U.S. have agreed to work together on cyber security, with the two countries setting up a working group to deal with the issue, U.S Secretary of State John Kerry said on Saturday in Beijing.
An Oregon farm products company is suing its own bank to recover losses after a phishing attack saw $223,500 transferred to accounts in the Ukraine over a period of three days in 2010.
A new Global Center for Cyber Security at the University of Oxford will coordinate international work on cyber threats and cyber security. The Center will receive £500,000 ($766,000) in UK government funding every year.
The idea that we might ‘think’ passwords instead of typing them sounds like science fiction – but a team of UC Berkeley School of Information researchers has proved that it can work, using existing ‘mind reading’ headsets.
Up to 81% of computer security professionals reuse passwords across multiple applications, violating security best practice
PayPal has warned of a looming security crisis if new top-level domains such as .bank are brought into use later this year.
Britain’s hi-tech government intelligence agency GCHQ should know better than to send passwords in plain text via email – but has been doing so due to “legacy systems”, it admitted in a statement this week.
British cyber security experts from intelligence services such as MI5 are to join forces with 160 top British firms to defend against cyber attacks.
Does your Apple Mac need antivirus software, or any other kind of security software? This question has been asked repeatedly over the years and I think the “correct’ answer has changed over time.
If you recently acquired an Apple Mac computer there are several simple steps you can take to protect your new machine, and all of the valuable information you will be storing on it.
[UPDATE #1: (21 Dec 2012, 5:30PM) ESET Researcher Cameron Camp has just published the second part of this series on securing your Android device. Read it here on the ESET Threat Blog at Securing Your Holiday Tech Gifts, Part 2: Android Guide. AG] December is upon us, and whether you have a Christmas tree, menorah,
With the recent announcements of password breaches at LinkedIn, and warnings from Google about state-sponsored attacks on Gmail accounts, it seems like a good idea now to review some password security basics. In this blog post, we’re going to take a look at a rather low-tech solution to a decidedly high-tech problem: How to guard
Phishers always try to find new ways to bypass security features and trick ‘educated’ users. Over the years we have seen simplistic phishing attempts where the required information had to be typed into the e-mail body. This worked at that time because phishing was new and hardly anyone had a notion of the implications. Later,
An emerging information security threat highlighted this week by Róbert Lipovský, namely theft and abuse of digital certificates by malware creators, serves as a timely reminder that these certificates are highly valuable digital assets that should be accorded the highest levels of protection. If your company uses certs purchased from root authorities such as Verisign,
Introduction LinkedIn is a social network platform whose specialty is connecting professionals together to build relationships and create business opportunity. Recently the company became publicly traded and grabbed the attention of the world as its initial public stock offering more than doubled on the first day. Here we focus tools and options for user privacy
Survey Reveals Chasm between Users’ Concerns and Behavior A recent Survey commissioned by ESET and conducted online by Harris Interactive from May 31-June 2, 2011 among 2,027 U.S. adults 18+ found a startling disconnect between user concerns about privacy and security and their actions on social networking sites. To start, the study found that 69%
Our friends (and competitors) at Sophos blogged about a new threat that poses as a Windows Update and then infects unsuspecting users with a fake antivirus product. The update appears to be very real and is tricking users. While my colleagues at Sophos offer excellent advice to help people protect themselves (as I believe we