As ever, ESET is once again in attendance at CES in Las Vegas, offering you expert insight into all the security aspects of this year’s show, which, from what have seen so far, is a key focus for CES in 2016.
ESET's senior research fellow David Harley explores and discusses the main issues surrounding copyright and social media.
At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For
If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even enter the endpoint, asks ESET's Cameron Camp.
Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security - while there is much to be done, there's a lot to be optimistic about she says.
ESET security researcher Lysa Myers looks at a few of the questions she has been hearing more often about the recent surfeit of insurer breaches.
Some of the good things in store for those attending Virus Bulletin 2015.
Linguistics and some form of textual analysis can be helpful in analysing malware and scams. Regional attribution, though, still requires caution.
Introduction It might not have escaped your notice that I write quite a lot about support scams, an issue in which most commentators in the security industry take only sporadic interest and tend to regard as of only niche interest. (As when a scammer is damaging their brand or product in some way, for instance
The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here's what you need to know.
Cybersecurity topics and panels were rated one of the “6 Best Things” at the recent Campus Tech conference, in Boston.
With children gradually going back to school in Latin American regions, it’s time to remind our children of the importance of IT security.
Security researchers found a vulnerability in Android that could allow attackers to steal information from smartphones through remotely executed code via a crafted MMS. According to them up to 950 million devices could be vulnerable.
Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.
Don't be cyber-flashed by a pervert. Make sure that your iOS device's AirDrop settings are configured properly to protect your eyes from unpleasantness.
If Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the new DEF CON. This year it got some Ikea furniture to spruce up its mom’s basement. Not totally commercial, but definitely more – first apartment folding furniture – chic; the basement just got upgraded.
This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining security to the CEO. A few succeeded in this new role, but enough to convince the execs that if something bad happens in IT, it happens to the execs shortly thereafter.
Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.
It's not all about crashing cars and hacking guns: what's hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.