The attackers gained access to a range of customer data such as names, addresses, phone numbers, dates of birth, and marital status. Making matters worse, the historical payment card details of some 18,000 customers were also compromised.
Imagine: your security is flawless. Not a single other person can access your sensitive information or accounts. And then the unthinkable happens – you’re in an accident. How will your loved ones get past your security measures to tend to your affairs?
Security includes firefighting and compliance as well as systems and network management, but should the same people do it all?
With more of a whimper than a bang, Microsoft has followed up on its August 2014 promise to end support for older versions of Internet Explorer. As of today (January 12th, 2016), Microsoft will end support and security updates for several versions of Internet Explorer running on various versions of Windows.
We look at the five top questions you should be asking before connecting to public Wi-Fi - while convenient, there are risks.
The internet is arguably the new frontier for communication, collaboration and business but, with criminals also using it for ill-gotten gains, it does have its bad parts too. And this is making life difficult for parents struggling to keep up with their child’s technology obsession.
The FBI has issued a warning to police and other emergency response personnel about a lethal new tool which 'malicious actors' have been using to deadly effect against American government institutions - Google dorks.
“You expect to watch TV, but you don’t want the TV watching you,” said Senator Charles E Schumer, as he called for improved security measures in "Smart" televisions.
Basic advice on cyber security survival for businesses is presented as a 6-step roadmap, along with links to free resources that can be useful in your efforts to defend your business.
[UPDATE #1: (21 Dec 2012, 5:30PM) ESET Researcher Cameron Camp has just published the second part of this series on securing your Android device. Read it here on the ESET Threat Blog at Securing Your Holiday Tech Gifts, Part 2: Android Guide. AG] December is upon us, and whether you have a Christmas tree, menorah,
Evidence that criminals are targeting the computer systems of small businesses continues to mount. The Wall Street Journal recently drew attention to the way cybercriminals are sniffing out vulnerable firms. The article highlighted the fact that about 72% of the 855 data breaches world-wide last year that were analyzed in Verizon's Data Breach Investigation Report
Attention CEOs and HR Managers: Facebook login credentials belonging to current or prospective employees are not something that any employer should request, use, or posses. Why? Apart from the violation of security and privacy principles? The risks far outweigh any benefit you imagine you could gain by logging into a social media account that does
Introduction Mobile World Congress 2012 is almost upon us, and one of the most hotly-anticipated topics is the next generation of Microsoft’s smartphone operating system Windows Phone 8, which has been kept under wraps far more tightly than its PC counterpart, Windows 8. While Microsoft was an early adopter in the creation of smartphones with
SOPA as currently constructed can never work as intended. I'm not going to get into the reasons we don't like it because of its oppressive implications or because it is against our first amendment rights nor for any other reason (there's been so much other commentary on those issues that it would be superfluous). I
I want share with you what ESET Latin America’s Research team thinks will be the main trends in malware and cybercrime in 2012. In our office it is usual to produce an analysis of emerging trends in a year-end report and so, in keeping with recent postings by my ESET colleagues, I present a summary
An updated version of the paper "Ten Ways to Dodge CyberBullets", addressing the question "what are the top 10 things that people can do to protect themselves against malicious activity?"
If Tanji'sarticle makes you more sceptical of those of us who pollute the blogosphere with our own opinions, that's a Good Thing.
Forensic software developer PassWare announced a new version of its eponymous software forensics kit on Tuesday. Already several news sources are writing about how the program can automatically obtain the login password from a locked or sleeping Mac simply by plugging in a USB flash drive containing their software and connecting it to another computer
Introduction LinkedIn is a social network platform whose specialty is connecting professionals together to build relationships and create business opportunity. Recently the company became publicly traded and grabbed the attention of the world as its initial public stock offering more than doubled on the first day. Here we focus tools and options for user privacy
In an unfortunate series of events related to the RSA SecurID technology, reports are coming in that Lockheed Martin's networks have been broken into by unknown perpetrators. Jim Finkle and Andrea Shalal-Esa broke an exclusive story and reached out to folks in the industry to get to the truth. "They breached security systems designed to