On the one hand, the breach of JP Morgan Chase is not as bad as it could have been. But how do you measure relative “badness” of a breach?
Over the past few years, Comic-Con has had over 130,000 attendees, and those attendees tend to be very digitally literate – so that means we will probably see double that number of connected devices – laptops, tablets, smartphones and perhaps even tricorders.
When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.
Cybercriminals always look for the weakest link when planning their attacks – and failings in home routers can allow another “way in”. A few simple adjustments will keep yours safe.
Job scams are a permanent fixture in cyberspace. Anyone who has posted their resume online has offered cyber gangs two crucial pieces of information – one, a way to contact them, and two, the fact they’re in need of a job.
Apple’s Mac OS X Mavericks has some very neat privacy features built in – from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.
Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack – and on LinkedIn, talking to the wrong ‘recruiter’ can lead to disaster.
Phishing is unique among cyber attacks – it doesn’t rely on weaknesses in computer software, or new vulnerabilities – it relies, initially at least, on human gullibility. Our guide offers advice on how to avoid the latest scams – and why tablet and smartphone users need to stay alert.
‘Adware’, software which delivers unwanted adverts, isn’t as scary as some malware, but ESET’s analysis of Win32/Boaxxe shows that ‘malicious’ adware is becoming increasingly hi-tech and stealthy. Our guide will help you clean your machine – and see fewer unwanted ads.
Few things are sacred to today’ cybercriminals – and true love certainly isn’t one of them. Dating scams are a fast-growing area of cybercrime – rising by a third year-on-year in some countries, and ranging from fraud, to identity theft to malware attacks. Here’s how to stay safe.
Despite the heists against Bitcoin sites, plus high-profile law-enforcement actions against ‘dark market’ sites such as Silk Road, which conducted transactions in Bitcoin, the currency is soaring. We asked ESET experts, and finance advisors, for tips on how to stay safe.
Don’t let cybercriminals spoil your holidays! Our tips will ensure you don’t get fooled by the latest scams while you hunt down the best deals for your family.
When Adobe admitted 38 million user IDs had leaked from its system this week, it was one of a long line of companies to fall victim to such data breaches. Most companies react fast – and offer good advice – but our guide adds a few extra safeguards if your ID is put at risk.
Ransomware can be among the most frightening forms of malware – suddenly, your screen is replaced by a message from the police, demanding money, or a message saying your files are lost unless you pay a ransom to unlock them. Our tips will help you fight back.
On average, Windows PC users spend five days a year waiting for their machines to load – and the culprit for slow machines isn’t always malware. Here are a few tips to restore your grumbling old PC to top speed.
Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”. Thankfully, a few simple changes can make you safer – wherever you browse, and whatever you do.
Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work – a practise described as “Bring Your Own Disaster” by IT wags for years. Disasters, of course, DO happen – our tips should help you avoid being the guy who brings one.
Malware, phishing and ID thieves are everywhere – but you don’t have to be paranoid, or hang back, or stop yourself enjoying the best the web has to offer. Our tips should help you browse with confidence.
These days cybercriminals will use phone calls, SMS messages, emails, fake apps – and even couriers – in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” – and catch phishers and fraudsters in the act.