archives

Blog Archives

To pay or not to pay? What you should know about ransomware

Ransomware is a very popular type of malicious code present and has a very peculiar operation: hijacks your files and asks for a monetary ransom. So should you pay the cybercriminals?

Child safety in a digital age

Child safety in the 21st century is no longer about so-called real world concerns. In a digital age, parents now need to be aware of the risks that also exist online. Here are a few things to consider.

What is an exploit?

Cybercriminals constantly use vulnerabilities to infiltrate networks, and their favorite tools for this are known as exploits. But what is an exploit?

Unboxing Linux/Mumblehard

Researcher Alexis Dorais-Joncas explains the new strain of Linux malware, uncovered by ESET researchers.

Tinder – Top 5 security tips

Digital dating has become more popular than ever because of apps like Tinder, but it’s not without risks. Stay safe by remembering the following tips.

WhatsApp – Top 5 security tips

WhatsApp is one of the most popular instant message apps in the world, but it’s not without security risks. Avoid the dangers with these 5 top tips.

Top 5 security resolutions for 2015

Follow these top 5 security resolutions from We Live Security to make for a safer 2015.

What is a botnet?

What is a botnet, and what can you do to prevent your computer becoming part of one?

How to spot a Facebook hoax

Hoaxes are all over Facebook so it’s vital that you know what to look out for. Keep in mind these 5 top tips when scrolling through your news feed.

How to stay safe on social media – 5 top tips

As social media becomes an increasingly large part of our everyday lives, It’s easy to forget the dangers hiding behind our feeds. So, remember these five top tips next time you login to Facebook and Twitter.

How to keep your webcam safe from hackers

Last year webcam security became a high priority after an anonymous website began posting live streams of the world’s unprotected webcams. Here are 5 top tips to keep yours safe from the hackers.

Top 5 security tips for Android Lollipop

Android Lollipop has a number of new ways to keep your data private. So, start with these top 5 tips to keep your smartphone secure.

The Biggest Hacks of 2014

There were a number of big security breaches during 2014, but which was the biggest? We count down the top 5.

How to make sure Adobe Flash is up to date

Follow these simple steps to make sure your Adobe flash player is up to date and to avoid any potential cyber attacks.

5 tips to help you stay safe on Instagram

Instagram has many settings to make sure your photos are kept safe and secure. Start with these top five tips/

Top 5 tips for safer Paypal payments

Paypal is one of the safest ways to make online payments, but there can still be security breaches if you’re not careful. Keep in mind these top 5 tips when paying online or sending money to your contacts

Ello Privacy – What you need to know

Ello Privacy was launched in March 2014 as an ad-free social network alternative, however the site still needs access to your personal data. Here’s the lowdown on the network’s key privacy principles.

How to transfer your data from iPhone to Android

Transferring all your data from iPhone to Android may seem like a hassle, but these 5 simple tips will make the transition a lot easier.

How to delete yourself from Google Search

Deleting yourself from Google is not quite as simple as pressing a button, but you can manage your digital footprint by following these 5 simple steps.

How to spot a Kickstarter scam

Crowd funding sites are full of great ideas, but can also be a hot bed of scams. Stay safe with these top 5 tips.

Follow us

Copyright © 2016 ESET, All Rights Reserved.