By the 1800s, long before the famous Enigma machine and military computerization to decipher codes, a Victorian woman trapped in a patriarchal world, glimpsed the potential reach of computing and the change it would impose on humanity.
As the Asia Pacific region continues to grow, and adoption of digital technologies – by consumers and businesses – continues, the region is starting to appreciate how attractive it has become to cybercriminals.
Cybersecurity is everyone’s responsibility and organisations need to train staff to ensure they have a more empowered and security savvy workforce.
The annual Virus Bulletin International Conference takes place in Madrid, Spain this October and ESET will be well represented across the three-day event.
The UK National Lottery website and smartphone app are taken offline as a DDoS attack strikes.
European Cyber Security Month and similar events, give cybersecurity companies the opportunity to reach out to the masses and get them involved.
Cloud services are very much what you make of them, and you need to apply at least an equivalent level of rigorousness, in terms of risk assessment, as you would with assets that are hosted on your own network.
What's safer? Using a numeric PIN code to unlock your Android smartphone or relying on a finger squiggle? The answer might surprise you.
While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.
The Android banking trojan that we first informed about in the beginning of this year has found its way to Google Play again and contains new tricks designed to get access to the private banking information of the user.
These new security measures will undoubtedly not only impact the security of data stored on a phone that has been lost or stolen, but could also complicate the progress of criminal investigations requiring the forensic analysis of a phone.
Websites are being told that they have until September 30th to pay extortionists $720 worth of Bitcoin, or else suffer a distributed denial-of-service (DDoS) attack.
Most companies have switched the majority of their services and information over to the cloud. There are many reasons for this, ranging from cost to practicalities.
FinFisher has extensive spying capabilities, such as live surveillance through webcams and microphones, keylogging, and exfiltration of files. What sets FinFisher apart from other surveillance tools, however, are the controversies around its deployments.
Regardless of how Piriform was breached, for a tool as widely downloaded as CCleaner, with a userbase running into the hundreds of millions, there will be a large impact worldwide, even though only the 32-bit version was affected.
Credit reporting agency Equifax has revealed more details of just how many people are affected in the UK, as consumers are warned of the risk of phishing attacks.
In the recent Equifax breach you may have noticed that people in the UK and Canada are also affected but there has been little clarification as to how many.
Cryptocurrency mining has been used by cybercriminals to make a quick and easy profit while corrupting the victim’s machine in the process.
Services like Netflix use content delivery networks (CDNs) to maximize bandwidth usage. However, the CDNs might be becoming a new way of spreading malware.
Cryptocurrencies work on a decentralized methodology, there is no server or centralized place that holds account details and transactions.