The UK’s chancellor, George Osborne, has revealed that a new National Cyber Centre will be developed in 2016, helping the UK deliver a robust and centralized response to this growing threat.
The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.
In this feature we explore why mobile security is of the utmost importance for individuals and organizations. If smartphones and tablets not adequately protected, they are extremely vulnerable to being exploited.
A Texas university is to research cybersecurity solutions to vulnerabilities in medical devices, boosted by a major grant from the National Science Foundation.
Thinking of using the cloud, but have doubts whether it’s secure enough? You are not alone. Many enterprises hesitate to fully embrace it, fearing that their sensitive data might get compromised when stored online. But is the risk really high or can it be managed?
Are you working on a new application? If so, consider these three recommendations that highlight the importance of thinking about information security.
Staying safe and protected online as an enterprise is growing in importance and recognition. We look at whether business security needs to be simpler?
ESET security researcher Lysa Myers looks at a few of the questions she has been hearing more often about the recent surfeit of insurer breaches.
Your work is important to you, your employer and cybercriminals as well. That is a good reason to stop and think before you connect.
Ahead of next week's Virus Bulletin conference, ESET's Lysa Myers offers a teaser of what to expect of her "small talk" with colleague Stephen Cobb.
There is a huge shortage of skilled professionals in cybersecurity. We take a look at five young geniuses who may be the future of the industry.
The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.
Governments around the world are recruiting “cyber warriors” to fight against the growing threat of both cybercrime and state-sponsored attacks - but there aren’t enough experts to go round.
A new cyber defense force is being set up in the UK to protect critical private and government computer networks from attack - “if necessary, to strike in cyberspace,” Britain’s Defense Secretary Philip Hammond has said.
NASA is no stranger to peering into nebulae in space - but the space agency found itself perplexed by the more Earthbound puzzle of cloud computing security, according to a report by the Office of the Inspector General.
President Obama has used a TV interview to further raise public awareness of the growing cyber security threat against the United States.
The winner of the 2103 UK Cyber Security Challenge, launched two years ago as part of a government and industry backed initiative to encourage people to choose a career in information security, has been announced.
[UPDATE #1: (21 Dec 2012, 5:30PM) ESET Researcher Cameron Camp has just published the second part of this series on securing your Android device. Read it here on the ESET Threat Blog at Securing Your Holiday Tech Gifts, Part 2: Android Guide. AG] December is upon us, and whether you have a Christmas tree, menorah,
A new study finds that only 1 in 10 consumers have had any classes or training about protecting their computer and/or their personal information during the last 12 months. Indeed, a shocking 68 percent say they have never had any such training, ever. These and other findings, first revealed by ESET at the Virus Bulletin
If your organization’s website runs on Apache, and many do, you might wonder if the webserver’s .htaccess controls are securely configured. If you believe the demo we saw yesterday at Blackhat by Matias Katz and Maximiliano Soler, the answer is a resounding ‘NO!’ What Katz and Soler described in their session is not some rare