Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.
While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.
Are hacking victims "hacking back"? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of "hacking back" when he asked me about revenge hacking.
Social networks are fun, but can also spread misinformation and worse. We discuss myths about your contract with Facebook, and whether British politicians are interested only in their own salaries.
More about the support scammer trend towards finding victims in Spain who aren't fluent English speakers.
An update on support scams: but are the scammers looking for fresh fields and posturings new?
The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.
Home Depot says it was hacked to the tune of 56 million payment cards. What is behind the current wave of cybercrime? This recorded presentation offers answers and some defensive strategies for organizations at risk.
Your home may be your castle, but on social networks, your friends are your perimeter. Will they enclose and protect your personal data?
The privacy and security of medical records is a matter of concern to many Americans now that most are now stored electronically, but is there cause for concern? And who is most concerned?
The risks of using government use of malicious code in cyber conflict are examined in this paper by Andrew Lee and Stephen Cobb: Malware is called malicious for a reason: the risks of weaponizing code.
New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.
Given the 'nightmare' that is password management, is Microsoft right to say that it's sometimes OK to re-use the same memorable password on several sites?
Internet surveillance by America's National Security Agency (NSA) has been further exposed by two new developments: the analysis of leaked NSA surveillance reports and the XKeyscore targeting code. Will these stories increase the number of Internet users who say they are inclined to reduce their online engagement due to the activities of the NSA and GCHQ.
With EPIC filing an FTC privacy complaint against Facebook, which is already the subject of a Consent Order due to a previous privacy settlement, the social network could be facing a hefty fine for emotion-based manipulation of the Newsfeed for research purposes.
One of the support scam sites used to mislead victims may be down, but the scam definitely isn’t about to go away.
Every educational institution should be aware that cyber criminals make money by stealing personal information and selling it on the black market to other criminals who turn the data into cash through a range of fraudulent schemes. Here are ten security measures schools should take to defend against this type of data crime.
The US is still perceived as a hotspot for card fraud: what difference will the ongoing roll-out of Chip & Signature EMV make?
Amazingly, it was way back in 2011 that I came across my very first World Cup 2014 scam. Surely that merits a prize, or at least a pay-rise?
The top three teams from the fifth annual Mayors' Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North America for five days of hands-on security training and lectures from IT experts, law enforcement, and career advisors.