Britain’s hi-tech government intelligence agency GCHQ should know better than to send passwords in plain text via email – but has been doing so due to “legacy systems”, it admitted in a statement this week.
Emailed wedding invitations have popped back up as a way to distribute malware Will this tactic join other malware-email staples like malicious tax season messages.
Use of pirated and counterfeit Windows software has tripled since 2006, according to analysts IDC – creating a fertile breeding ground for malware. For the report, entitled ‘The Dangerous World of Pirated and Counterfeit Software’, IDC analysts conducted 533 tests on counterfeit software from P2P and web sources.
The value of educating people about cyber security is hotly debated these days, with opposing views on security awareness training coming from Bruce Schneier and Ira Winkler. Stephen Cobb weighs in.
The new trend for “always online” games such as SimCity and Blizzard’s Diablo 3 may be putting gamers at risk, experts warn. The games, which require an internet connection even for single-player gaming, are designed to protect game companies from piracy.
British cyber security experts from intelligence services such as MI5 are to join forces with 160 top British firms to defend against cyber attacks.
Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.
Malicious spam may still be spreading across Yahoo! Mail accounts. We show you how to turn on the added verification process that Yahoo! offers.
Major world events always bring with them an upsurge in related spam and the election and inauguration of a new Pope is no exception.
Protection and remediation tips for Mac OS X users targeted by a Trojan adware plugin called Yontoo hidden behind movie trailer and other media playing links, generating money for criminals exploiting online ad schemes.
The new ESET blog format must be striking a real chord with people. At any rate, job offers are just pouring in. Except that they don’t seem to be jobs for security bloggers, or for web developers like the team that maintains this site.
Technical analysis of Power Loader, a special bot builder for making downloaders for other malware families and yet another example of specialization and modularity in malware production.
If your friend said it on Social media it must be true? Not if your friend’s acount has been hacked. We review tips for staying safe on social media.
According to a survey by technology industry analysts Gartner, the adoption of mobile devices is happening even faster than expected.
Even the smallest web based business in the world will attract criminal hackers interested in stealing financially valuable data.
While many Android users speculate about Google’s removal of ad-blocking apps from the official Android store, Google Play, we consider the risky behavior that is bound to result.