category

Opinion

What’s the cost of a free lunch?

We all know that there is no such thing as a free lunch, or security product, so what’s the catch?

Black Hat: Hacking the firmware, the next frontier

Trick the firmware and you have access to the whole system. Here at Black Hat, there are a lot of people doing just that.

Black Hat 2017 industrial hacking: The song remains the same

If industry frameworks are to inform and secure the critical infrastructure writ large, here at Black Hat there a lot of people punching holes in them, and in simple ways.

Black Hat 2017: Non-standard hacking platforms reign supreme

This year at Black Hat, tiny automated hacking platforms are everywhere, loaded with tasty purpose-built tools that can be used to break into your systems.

Black Hat 2017: Hacking the physical world

Cameron Camp, in attendance at this year’s Black Hat in Las Vegas, takes a closer look at attacks against physical infrastructure.

Going to Black Hat? Bring your (marketing) wallet

This year at Black Hat, it will be incumbent upon newer vendors to make sensational claims to gain market share from established vendor, says Cameron Camp.

Election hacking FAQ: 2016 US presidential election edition

Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.

Snowden: 4 big security and privacy assumptions he undermined

ESET’s Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.

VMworld: The year of the developer

At VMworld there are a bewildering number of technologies trying to integrate in order to provide your data to entire networks, reports ESET’s Cameron Camp.

VMworld: Can you trust your API?

All too commonly API security is something of an afterthought, says ESET’s Cameron Camp at this year’s VMworld. This needs to change.

VMworld: Do you know where your data is?

VMworld this year feels like a confessional – operators coming clean about their lack of data visibility, heads hung in shame, says ESET’s Cameron Camp.

Car hacking: Defcon style

This year at Defcon, the car hacking village is bigger than ever, says Cameron Camp. Key observation? The tools are getting better.

Black Hat 2016: When middleware takes over the world

In years past at Black Hat here in Las Vegas, there was row after row of hardware, then, in later years, row after row of software – Now there’s row after row of middleware.

Comic-Con: Travel, safety and privacy guide

Ahead of this year’s Comic-Con in San Diego, ESET’s Aryeh Goretsky has put together a handy travel, security and privacy guide.

Interop: Getting a few more years out of your tech

Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no one could figure out what to do with a hard drive “that large”.

The Four “A”s of Account Management

It’s said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!

Apple and ‘exceptional access’ to crypto protection

Apple is the latest in a host of technology players to be requested to allow exceptional access, that is, access in exceptional cases where it would be deemed to have high value relative to an active investigation.

CES 2016: Day 3 – the drones are back (but with augmented reality)

The final instalment in Cameron Camp’s security-focused coverage of CES 2016, looks at the future of drones. It’s all about augmented reality.

CES 2016: Day 2 – making smarter cars

Car security is rising to the fore here at CES 2016, which is not altogether surprising as 2015 was the year when car hacking really crossed over into the mainstream.

Should I stay or should I go … to Windows 10?

It has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to this latest release of Microsoft’s flagship operating system is going to be on the minds of administrators for 2016, says ESET’s Aryeh Goretsky.

Follow us

Copyright © 2018 ESET, All Rights Reserved.