The health service is now on the lookout for a partner to help run the project, having invited interested parties to tender for a contract that is set to run for three to five years. The new center is set to be based in the English city of Leeds.
Search results for: "WannaCryptor"
The Information Commissioner's Office (ICO) in the United Kingdom has issued a stark reminder and straight-to-the-point warning for all employees who might be tempted to snoop on others’ personal data.
Commentary on government struggles to protect internet security while stockpiling cyber vulnerabilities in order to launch attacks and gain intelligence.
Cyber vulnerability hoarding? The US government publishes its Vulnerabilities Equities Policy (VEP) and describes the process by which cyber flaws found by agencies such as the NSA are handled.
The biggest news in malware so far this year has been WannaCryptor a.k.a. WannaCry, and one reason that particular ransomware spread so fast was because it used a “top secret” exploit developed by the NSA, an agency known to have dabbled in UEFI compromise.
When thinking about security we generally take risk into account. It is well known that risk is a composition of likelihood and potential impact.
National Cyber Security Awareness Month and its events have become top of mind for people and businesses in recent years, given the staggering number of recent data breaches and global ransomware attacks.
European Cyber Security Month and similar events, give cybersecurity companies the opportunity to reach out to the masses and get them involved.
While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.
We are halfway through the year and it is a good opportunity to analyze the extent to which the ideas we gathered in the Trends 2017: Security Held Ransom report have come true.
Lloyd’s of London have reported that a serious cyberattack could cost the global economy as much as a devastating natural disaster.
How do patches work? Could the Microsoft patch have stopped WannaCryptor? All your questions answered.
The latest global cyberattack, detected by ESET as Win32 / Diskcoder.C, considered a variant of Petya, once again highlights the reality outdated systems and insufficient security solutions are still widespread.
This article reveals details about the initial infection vector that was used during the DiskCoder.C outbreak.
This blogpost reveals many details about the Diskcoder.C (aka ExPetr or NotPetya) outbreak and related information about previously unpublished attacks.
As baby boomers retire and the employment gap in cybersecurity is plugged by generation x, we look at how millennials are set to shape the industry.
Machine learning (ML) in eight blogposts!? In our last post, let’s take a peek under the hood of ESET’s cybersecurity engine and its ML gears.
Multimillion dollar movies and TV shows are increasingly being targeted by cybercriminals. ESET's Stephen Cobb investigates the cyber supply chain risk management problem and explains what to do about it.
Early in 2017, Kevin Townsend invited David Harley and others to comment on vendor hype. Here he expands on his original commentary.
Regardless of how prominent and effective ransomware appears to be, it is not the most dangerous form of malware.