Just as in past decades when cash drawers and bank vaults were targeted for theft, today’s e-shops and online banks have fallen under the scope of cybercriminals. Their “digital-focus” is just an evolutionary step beyond robbing stagecoaches in the Wild West, and banks in the 20th century.
Search results for: "zero trust"
The annual Virus Bulletin International Conference takes place in Madrid, Spain this October and ESET will be well represented across the three-day event.
Stop! Should you really be clicking on that link you just received in your email? Gmail's iOS app is now offering some additional safety nets for the unwary.
WikiLeaks's revelations about security vulnerabilities in Apple products appear to be a damp squib.
How do you calculate the value at risk? Choosing between investing in antivirus software or doing nothing to prevent cybercrime is not black and white. We explore the grey areas of cybersecurity economics.
What awaits us in terms of mobile security trends? Throughout this article, we will discuss how risks might develop in the near future.
Welcome to this week’s security review, which includes ESET releasing a new decryptor for TeslaCrypt ransomware, new revelations about a 2012 LinkedIn data breach and expert insight into Operation Groundbait.
This year RSA is drowning in buzzword-laden security startups. If you’ve got a next-gen cloud-enabled startup that catches 100% of zero days no has even thought of yet, there’s an RSA booth for you. No track record? No problem. Not sure whether it’s hardware or software? No problem. The problem is that real security is really hard.
ESET has looked deeper into what parents in the United States, Germany, the United Kingdom and Russia regard as the appropriate age for digital activities.
Many people are unaware of what measures they can take to identify malicious activity on their smartphone. We look at how at the key signs to be aware of.
Online banking from the comfort of your own home makes life much easier, but you may still be at risk of cybercrime. We look at how to stay safe.
There is a huge shortage of skilled professionals in cybersecurity. We take a look at five young geniuses who may be the future of the industry.
When it comes to data security, hackers continue to exploit the biggest weakness – people. So, what are the top security mistakes we keep making?
A Russian hacking group planned on launching cyberattacks against several banks around the world, according to SC Magazine.
Here’s a small selection of alternatives to Bitcoin - each of which has its own advantages. All of them share Bitcoin’s fundamental strengths, however - minimal or zero transfer fees, and freedom from traditional banking restrictions.
Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?
Cybercrime: there's too much of it, and we need to do more to deter it. With the President of the United States now making frequent references to "doing more about cybercrime" now is a good time to look at what steps must be taken.
While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.
Gamers have become major targets for hackers - from large-scale attacks against gaming companies, to small-scale scams carried out via game chat channels. But a few easy security steps should help keep your precious rig at full speed - and safe.
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one