Who would have thought that webcams could be exploited? Well, they can, and so serious is the issue, that it has the likes of Mark Zuckerberg covering them with up with tape.
Demand for information security specialists is growing, and there are many routes to qualification. Do you have the skills to transform cybersecurity?
The Global Cybersecurity Index (GCI) measures a nation's commitment to cybersecurity and encourages countries to take the issue more seriously.
One of the biggest problems to overcome for business security is trying to work out what areas you need to secure, explains ESET's Mark James.
Infosec is a technical discipline, but it also requires good, skilled cybersecurity professionals. We take a look at the bigger picture.
Celebrating the 17th annual SysAdmin Day, we recognize their dedication and workplace contributions and want to show appreciation for their talent.
In the spirit of this year’s Olympics, which is being held in Rio de Janeiro, we thought we’d host our own little information security Olympic Games.
When it comes to APAC cybersecurity, there is room for improvement. In this feature we take a look at key trends across this region.
One of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET's Josep Albors.
Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, which has just launched. Watch out for fakes.
WeLiveSecurity begins a new series of articles showing the different angles that can be taken when tackling a pentest.
If you are traveling this summer and taking your gadgets with you, this guide will ensure that you keep cyber safe when on the road.
The importance of ensuring information security on critical infrastructure has been recognized for years, yet there are still cases that illustrate the need for improvement.
As a recent study finds that half of people plug in USB sticks found at their work’s car parking lot, we ask if the USB security threat will ever go away.
ESET's Lysa Myers discusses audit logging and how it can help you track and identify security violations, performance problems, and flaws in applications.
In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET's Lysa Myers.
Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are, says ESET's Lysa Myers.
On World Day for Safety and Health at Work, we’ve put together a brief guide on potential cyber stresses to avoid in the workplace.
It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. ESET's Cameron Camp looks explores the challenges of data security.
How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.