The current hype, this Christmas and beyond, is the connected toy. Not sure what that means? Well, here are seven things you need to know about this increasingly popular plaything.
Archives - December 2015
Cyberbullying and online abuse is a growing problem, and one insurance company is taking it so seriously that’s it’s willing to cover those who fall victim to harassment on the internet.
A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers' sites offline, after receiving threats about an imminent internet attack.
You might already have mince pies on the mind as we countdown to Christmas, but cybercrime doesn't sleep and neither should your security solutions. Here is this week's security review – our recap of the biggest, most interesting stories and opinions from the past seven days.
Increasingly, on special occasions like birthdays and Christmas, parents are buying mobile and internet connected devices for their children. Our guide looks at how to make them safe before they are are unwrapped.
A new survey of consumers from across the globe finds that data breaches have an impact on their trust in a business that has been the victim of a cyberattack.
Tis’ the season to be jolly but Christmas is also a happy time of year for cybercriminals looking for their own gifts. We look at what you can do to ensure it’s only Santa that is allowed to bypass your security.
A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.
The UK’s Science and Technology Committee has heard that it is possible for the government to remotely access and use smart toys to spy on suspects.
Tech support scams are “still big business”, ESET’s David Harley has previously said. In this guide we look at how fraudsters dupe their victims into handing over cash, while also corrupting their devices.
The demand for cyber experts is at a record high, with more firms eager to secure the services of experts to ensure they are safe from attacks. And they’re willing to pay top dollar.
MEPs in the European Parliament have agreed on the need for EU-wide cybersecurity legislation, which will establish a common framework for all member states to subscribe to.
At home, on the move, on a computer or via a mobile, online shopping habits have changed massively as technology as become more powerful. With Christmas around the corner, we look at some of the key details.
ESET's senior research fellow David Harley explores and discusses the main issues surrounding copyright and social media.
Have you spoke to your kids lately? We bet if you have, then you are all too familiar with what they tend to talk about – video games. While you may still be clueless about the ins and outs, its worth reading up on online gaming, as there are plenty of risks you never knew possible.
At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For
In an recent interview, IT expert Gary McKinnon candidly revealed detail on his NASA data breach and finding documents on ‘extraterrestrial life’.
Leeds United-loving football fans appear to have hacked the Twitter account of WWE legend Jim Ross, and announced his death.
Hacker Buba has released tens of thousands of records belonging to Invest Bank customers online.
The last seven days in information security have been notable to say the least, with VTech experiencing a major data breach and Google being the subject of a complaint over data gathering practices. Read on for more on both these stories, as well as other highlights of the past week.