Senior research fellow Righard J. Zwienenberg on why the Internet of Things could be *the* key security issue for the foreseeable future.
Windows expert Aryeh Goretsky discusses threats to Windows past, present and future. Will Windows 10 mean hackers have to work harder?
Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet’s impact on security research.
Harley says that scams and social engineering have been a constant in cybercrime – but in the past few years, some scams have got markedly more sophisticated, and more difficult even for a trained eye to spot.
ESET’s Mark James on the issues employees have with business security measures, and how to counter the difficulties without compromising safety.
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.
Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.
Phil Zimmermann invented the most widely used system of email encryption in the world – and says that Fortune 100 companies are queuing up for his encrypted Blackphone, which allows “whispered” conversations, anywhere.
Francois Gagnon is a Canadian business owner who was targeted because his company had lots of servers, and many customers – victims for the gang. Gagnon didn’t notice for weeks, until complaints from customers alerted him. A team of ESET experts contained the infection, and Gagnon’s help with forensics was also valuable.
Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is not science fiction – but very close to reality.
I was interviewed yesterday by Fred Donovan, following up on the paper on AMTSO I presented at EICAR earlier this month. I may be prejudiced, but I think he's summarized my current thoughts on the topic pretty well in the article, though it isn't my recommendation that the existing guidelines be reviewed independently: it was
This is part two of a recent email interview with a Turkish web site, with part one made available here for the benefit of those of us who don’t speak Turkish. I’ve done a little editing on parts one and two, primarily for cosmetic reasons. Question (4): What the golden rules for using the Internet with
So, back in harness. I’ve been away for a couple of weeks: not on holiday as such, though I did take some days out, but concentrating on writing: it didn’t hurt that I didn’t have a full-strength internet connection to distract me, though. Before I left, I was interviewed by a Turkish security site. It