A smarter approach to password security ‘needed’
A smarter approach to password security is needed to help prevent cybercriminals from easily accessing our accounts and stealing personal information.
A smarter approach to password security is needed to help prevent cybercriminals from easily accessing our accounts and stealing personal information.
Security includes firefighting and compliance as well as systems and network management, but should the same people do it all?
The world is going crazy for Pokémon GO. Here are some top tips from ESET's Lysa Myers on how to enjoy this latest sensation safely.
In 1999, David L. Smith launched the Melissa virus. Within a few hours, it had infected thousands of computers. We take a look back at its impact.
ESET has discovered the first ever fake lockscreen app on Google Play, named Pokemon GO Ultimate. As its characteristics suggest, it deliberately locks the screen right after the app is started forcing the user to restart the device.
ESET has discovered eight fake applications on Google Play, which were promising to boost the number of followers on users’ social network profiles. Our security software is detecting these as Android/Fasurke.
Ahead of this year's Comic-Con in San Diego, ESET's Aryeh Goretsky has put together a handy travel, security and privacy guide.
Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, which has just launched. Watch out for fakes.
During the first half of this year, ESET has observed an increase in the number of detections of Nymaim, a long-known malware family whose prevalence has fallen markedly since 2014.
WeLiveSecurity begins a new series of articles showing the different angles that can be taken when tackling a pentest.
Fast food giant Wendy's says that it now believes that more than 1000 of its restaurants across the United States have fallen victim to a hacking gang, who used malware to steal customers' credit and debit card information.
Organizations need to better understand how “ruthless and efficient” cybercriminals are, according to a new report from BT and KPMG.
WeLiveSecurity delves deeper into VPN networks, asking how do they work? And what are the most common types of VPN that can be implemented?
Over the past year, cases of ransomware have gained prominence in the field of computer security due to a notable growth in the number of victims. This is, in turn, due to the significant profits that cybercriminals can obtain from this type of malicious campaign.
For the last few weeks, ESET has been investigating OSX/Keydnap, a malware that steals the content of the keychain while maintaining a permanent backdoor.
A 28 year-old Chicago man has pleaded guilty to using phishing scams to illegally access more than 300 iCloud and Gmail accounts, around 30 of which belonged to celebrities.
When it comes to data leaks, what are the major weak spots you need to be looking out for? This feature explores three common causes.
Welcome to this week’s security review, including a closer look at cash machine security as ATMs turn 49 years old.
Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit.