Malware simulators are not an appropriate basis for testing product detection capabilities.
DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them - a combination that has not been seen previously in the Android ecosystem.
National Cyber Security Awareness Month and its events have become top of mind for people and businesses in recent years, given the staggering number of recent data breaches and global ransomware attacks.
The countdown is on. In just over eight months’ time, the General Data Protection Regulation (GDPR) will come into force and this will have huge implications for businesses.
A recent Ipsos survey, found that only 26 per cent of Canadian SMBs feel very confident that their business and its information is safe from cyberattacks
By the 1800s, long before the famous Enigma machine and military computerization to decipher codes, a Victorian woman trapped in a patriarchal world, glimpsed the potential reach of computing and the change it would impose on humanity.
As the Asia Pacific region continues to grow, and adoption of digital technologies – by consumers and businesses – continues, the region is starting to appreciate how attractive it has become to cybercriminals.
Cybersecurity is everyone’s responsibility and organisations need to train staff to ensure they have a more empowered and security savvy workforce.
The annual Virus Bulletin International Conference takes place in Madrid, Spain this October and ESET will be well represented across the three-day event.
The UK National Lottery website and smartphone app are taken offline as a DDoS attack strikes.
European Cyber Security Month and similar events, give cybersecurity companies the opportunity to reach out to the masses and get them involved.
Cloud services are very much what you make of them, and you need to apply at least an equivalent level of rigorousness, in terms of risk assessment, as you would with assets that are hosted on your own network.
What's safer? Using a numeric PIN code to unlock your Android smartphone or relying on a finger squiggle? The answer might surprise you.
While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.
The Android banking trojan that we first informed about in the beginning of this year has found its way to Google Play again and contains new tricks designed to get access to the private banking information of the user.
These new security measures will undoubtedly not only impact the security of data stored on a phone that has been lost or stolen, but could also complicate the progress of criminal investigations requiring the forensic analysis of a phone.
Websites are being told that they have until September 30th to pay extortionists $720 worth of Bitcoin, or else suffer a distributed denial-of-service (DDoS) attack.
Most companies have switched the majority of their services and information over to the cloud. There are many reasons for this, ranging from cost to practicalities.
FinFisher has extensive spying capabilities, such as live surveillance through webcams and microphones, keylogging, and exfiltration of files. What sets FinFisher apart from other surveillance tools, however, are the controversies around its deployments.
Regardless of how Piriform was breached, for a tool as widely downloaded as CCleaner, with a userbase running into the hundreds of millions, there will be a large impact worldwide, even though only the 32-bit version was affected.