Business security


284 articles

Critical Infrastructure

ENISA to invest in emerging smart critical infrastructure security

ENISA to invest in emerging smart critical infrastructure security

Critical Infrastructure

ENISA to invest in emerging smart critical infrastructure security

Enhancing security in emerging smart critical infrastructures will be a key focus areas for the European Union Agency for Network and Information Security in 2016.

Karl Thomas28 Oct 2015


Business Security

The big small business security challenge: mobile and BYOD

The big small business security challenge: mobile and BYOD

Business Security

The big small business security challenge: mobile and BYOD

In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.

Cameron Camp07 May 2015


How To, Business Security

The future of security in healthcare: Mobile devices

The future of security in healthcare: Mobile devices

How To, Business Security

The future of security in healthcare: Mobile devices

The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?

Lysa Myers20 Mar 2015


Ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

Ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Marc-Etienne M.Léveillé09 Mar 2015


Ransomware

CTB-Locker: Multilingual Malware Demands Ransom

CTB-Locker: Multilingual Malware Demands Ransom

Ransomware

CTB-Locker: Multilingual Malware Demands Ransom

Starting a few days ago, we began receiving multiple reports of malware-spreading campaigns in various countries mostly in Latin America and Eastern Europe.

Pablo Ramos21 Jan 2015


Critical Infrastructure

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

Critical Infrastructure

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.

Rob Waugh13 Feb 2014


Cybercrime, Business Security

Huge shortage of cyber-defenders as threat levels 'highest since records began', Cisco report warns

Huge shortage of cyber-defenders as threat levels 'highest since records began', Cisco report warns

Cybercrime, Business Security

Huge shortage of cyber-defenders as threat levels 'highest since records began', Cisco report warns

Cisco claims in its report that cybercrime is now a global, professional industry - and there is a worldwide shortage of professionals able to defend against such attacks, with new technologies in malware meaning that there is a shortfall of a million IT professionals.

Rob Waugh17 Jan 2014


Ransomware

Cryptolocker 2.0 – new version, or copycat?

Cryptolocker 2.0 – new version, or copycat?

Ransomware

Cryptolocker 2.0 – new version, or copycat?

Last month we discovered filecoder malware which called itself “Cryptolocker 2.0”. Naturally, we wondered if this is a newer version of the widespread ransomware from the creators of the first. We look at the details that hint that it might have been created by some other, unknown, cybercrime gang.

Robert Lipovsky19 Dec 2013


Business Security

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

Business Security

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.

Rob Waugh17 Dec 2013