Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.
Archives - March 2014
Will the future be a murderous game of 'smart device' Cluedo, where Colonel Mustard meets his death at the hands of a Wi-Fi pacemaker, and Miss Scarlett is consumed in a Smart Home-ignited blaze. Not likely, says David Harley - where's the profit motive?
Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which allows nearby attackers easy access to the set’s Wi-Fi adapter.
A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues - and even against the hi-tech tentacles of government organizations with “back doors” into corporate servers.
For most of us, earwax is a bodily product we prefer not to think about, but a team of scientists have discovered that the substance reveals a huge amount about its creator - and could even be used to identify people.
Popular blogging service Tumblr has become the latest web giant to add two-factor authentication as an “extra layer” of security for users - describing its new measure as a "nuclear defense system" armed with twin keys.
Windows XP comes to an end of sorts on April 8, 2014. After this, Microsoft will cease providing security updates or support for this venerable operating system. ESET discusses implications and resources.
Dynamic or on-access Mac testing of AV products is problematical with samples for which Apple has implemented signature detection.
Mark Zuckerberg, Paypal founder Elon Musk and Ashton Kutcher have invested $40 million in an artificial-intelligence start-up, Vicarious, which can already 'read' CAPTCHA codes - and aims to mimic functions of the human brain.
Contrary to reports late last week, the BlackBerry smartphones used by White House staffers and the President are not to be replaced by Android or Windows Phone handsets from Korean manufacturers LG and Samsung.
Bitcoin’s developers have released a new version of the software, which includes a long-awaited fix for the “transaction malleability” bug which is said to have brought down the Mt Gox exchange - and Mt Gox staff have 'found' 200,000 BTC in an abandoned wallet in the exchange.
Starting today, Gmail will use an encrypted HTTPS connection to check or send email, regardless of what platform users employ to access the service - and will use security measures when moving mails internally, citing fears over government snooping.
Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all Mac users can update to the latest version freely (providing their machine is up to the new software – which Apple allows you to check here). But under the bonnet of Mavericks lurk
A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS - allowing malicious apps to ‘sneak’ onto a phone with a relatively innocuous list of ‘Permissions’, then add new, malicious abilities.
The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as a feature film by Sony. The studio bought the rights to the New York Times article, "Reporting From the Web’s Underbelly," with a view to creating a "cyber thriller."
Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings - a huge leap forward in the technology, with some potentially alarming implications for privacy.
Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece - despite Google’s policies explicitly forbidding such programs.
Personal data for around 20,000 workers for the U.S. Internal Revenue Service (IRS), including names, social security numbers and addresses may have been exposed, after an employee plugged a thumb drive into a computer on an unsecured home network.
As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.
Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.