Business security


395 articles

Ransomware: To pay or not to pay?

Ransomware: To pay or not to pay?

Ransomware: To pay or not to pay?

The recommendation by the FBI that victims of ransomware pay up to have their files decrypted created a buzz within IT folks of all kind. It’s time to ask: Should paying the ransom really be considered an option?

Peter Stancik30 Oct 2015


ENISA to invest in emerging smart critical infrastructure security

ENISA to invest in emerging smart critical infrastructure security

ENISA to invest in emerging smart critical infrastructure security

Enhancing security in emerging smart critical infrastructures will be a key focus areas for the European Union Agency for Network and Information Security in 2016.

Karl Thomas28 Oct 2015


The big small business security challenge: mobile and BYOD

The big small business security challenge: mobile and BYOD

The big small business security challenge: mobile and BYOD

In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.

Cameron Camp07 May 2015


The future of security in healthcare: Mobile devices

The future of security in healthcare: Mobile devices

The future of security in healthcare: Mobile devices

The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?

Lysa Myers20 Mar 2015


CryptoFortress mimics TorrentLocker but is a different ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Marc-Etienne M.Léveillé09 Mar 2015


CTB-Locker: Multilingual Malware Demands Ransom

CTB-Locker: Multilingual Malware Demands Ransom

CTB-Locker: Multilingual Malware Demands Ransom

Starting a few days ago, we began receiving multiple reports of malware-spreading campaigns in various countries mostly in Latin America and Eastern Europe.

Pablo Ramos21 Jan 2015


Internet of things - tests show almost all devices “riddled” with flaws

Internet of things - tests show almost all devices “riddled” with flaws

Internet of things - tests show almost all devices “riddled” with flaws

A new report found hundreds of serious security flaws in some of the most popular Internet of Things gadgets - the problem is far deeper than thought, with 70% of the most popular such gadgets having serious security flaws.

Rob Waugh30 Jul 2014


Google's Nest security warning after researchers show off 60-second hack

Google's Nest security warning after researchers show off 60-second hack

Google's Nest security warning after researchers show off 60-second hack

Google’s Nest thermostat can be hacked in under a minute, according to a blog post and video posted by GTV Hacker. The hack would allow attackers complete control over the device and access to the user’s home network.

Rob Waugh25 Jun 2014


White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.

Rob Waugh13 Feb 2014