password

There are 45 articles related to this topic
45

Biometrics – can your fingerprint be ‘copied’ from a normal photo?

Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones - but biometrics may not be as secure as many believe.

read more
44

Gamer PCs – how to keep yours clean and mean

Gamers have become major targets for hackers - from large-scale attacks against gaming companies, to small-scale scams carried out via game chat channels. But a few easy security steps should help keep your precious rig at full speed - and safe.

read more
43

U.S. State Department shuts down entire email system after suspected attack

The U.S. State Department has shut down its entire unclassified email system after a suspected intrusion - and technicians are now working to beef up email security systems.

read more
42

Wearable tech and security – can watches help?

So far, wearable tech has been of interest mainly to fitness fiends - but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even 'three-factor security'. Can a watch really keep secrets?

read more
41

Windows 10 to tighten security with prominent 2FA

Microsoft is taking aim at traditional single password systems with the upcoming version of Windows, by including build in two-factor authentication according to ZDNet, which describes the move as "audacious plans to tighten security".

read more
40

Free ebooks warning: Pirates ‘can hack into Amazon accounts’

Pirates beware: free ebooks available online can be used to hack into Amazon accounts via the retail giant's ‘Manage Your Kindle’ page, used to deliver ebook files to Kindle readers.

read more
39

Home Depot credit cards: chain confirms breach, fraud spikes

The world’s largest home improvement chain store, Home Depot, yesterday confirmed a data breach affecting credit cards and debit cards used in stores on the American mainland, which may have continued since April.

read more
38

Strong password – Chrome now offers ‘pronounceable’ choices

Google Chrome will now recommend pronounceable password hoices, according to developer and Chrome “happiness evangelist” Francois Beaufort, who announced the change via his Google+ page.

read more
37

Bank security – Barclays to offer vein-scanner to big accounts

A bank is to allow remote log-ons using a hi-tech vein-scanning biometric system for large corporate accounts. The bank security system, using Hitachi’s VeinHD scanner, will be available to corporate customers from next year.

read more
36

IFA 2014: Huawei phablet has ‘iPhone-like’ fingerprint ID

Another major phone brand has added biometric security to a flagship smartphone as Huawei unveiled the ultra-thin Mate P7, complete with a rather unique fingerprint scanner, at Berlin’s IFA 2014 show.

read more

Follow us

HOT TOPICS

Android

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Android ransomware

The latest ESET discoveries of Android ransomware.

arrests

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Ashley Madison

Cheating network Ashley Madison has been hacked, compromising the private details of the service's owners and 37 million users. The site, which has the slogan “Life is short. Have an affair.”, was attacked by a group calling itself the Impact Team, which claims to have gained complete access to the company’s databases – including user names, addresses and profiles, as well as company documents, emails and more.

Banking malware

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Barack Obama

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Bitcoin

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

BlackEnergy

On December 23rd, 2015, around half of the homes in the Ivano-Frankivsk region in Ukraine (population around 1.4 million) were left without electricity for a few hours. According to the Ukrainian news media outlet TSN, the cause of the power outage was a “hacker attack” utilizing a “virus”.

blackphone

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Botnet

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Brazil

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Celebgate

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

credit card fraud

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

crime

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Cybercrime

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

cybersecurity

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

cycling

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Darkode

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

data protection

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

data security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

DEF CON

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

domain registrar

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

eNom

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

fa

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Facebook

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Facebook security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Fappening

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

fighting

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Fighting post-truth with cybersecurity reality

To bring more clarity to the murky waters of post-truth marketing, we at WeLiveSecurity have decided to release a series of short articles focused on the currents state of AI, all the ins and outs of ML, and ML as it affects cybersecurity.

fiinancial penalties

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

GDPR

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Google Play porn clicker

Google Play porn clicker, described as a large-scale campaign, belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

Google security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

hack

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

hacking

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

healthcare

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Healthcare IT security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Heartbleed

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Industroyer

The 2016 attack on Ukraine’s power grid that deprived part of its capital, Kiev, of power for an hour was caused by a cyberattack. ESET researchers have since analyzed samples of malware, detected by ESET as Win32/Industroyer, capable of performing exactly that type of attack.

Internet of Things

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

interview

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

lessons

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Linux malware

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Malware

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Mobile

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Mobile connectivity

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

North Korea

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

password

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

payment cards

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

phishing

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Phone scams

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Pokémon GO

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

prison

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

privacy

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

PwC

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

scam

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Seguridad en IoT

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

smartphone

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

sony

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Sony Pictures

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

spam

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Stegano exploit kit

Visiting popular websites and getting infected without any interaction? ESET explains how the stealthy Stegano exploit kit, hiding in the pixels of malicious ads, is capable of performing this dirty job.

Target

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Team Sky

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

threats

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

tor

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Tour de France

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

twitter

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

two factor authentication

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

UK fines

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Valentine's Day

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

vm

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Vulnerabilidades

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

WannaCryptor

WannaCryptor, aka WannaCry, is one of the biggest cybersecurity stories of 2017.

Wi-Fi security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Windigo

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

windows

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Windows XP

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Copyright © 2018 ESET, All Rights Reserved.