Blog Archives

Sednit: How this notorious cyberespionage group operates

Take a closer look at the cyberespionage group Sednit, which has targeted over 1000 high-profile individuals and organizations with phishing attacks and zero-day exploits.

What is encryption and how does it work?

It has become one of the most topical and discussed topics in information security in recent times. In this video we outline some of the key aspects of encryption.

What is cyberbullying and how to defend against it?

Cyberbullying has come to be a huge problem on the internet. Here are some important things to be aware of.

To pay or not to pay? What you should know about ransomware

Ransomware is a very popular type of malicious code present and has a very peculiar operation: hijacks your files and asks for a monetary ransom. So should you pay the cybercriminals?

Child safety in a digital age

Child safety in the 21st century is no longer about so-called real world concerns. In a digital age, parents now need to be aware of the risks that also exist online. Here are a few things to consider.

What is an exploit?

Cybercriminals constantly use vulnerabilities to infiltrate networks, and their favorite tools for this are known as exploits. But what is an exploit?

Unboxing Linux/Mumblehard

Researcher Alexis Dorais-Joncas explains the new strain of Linux malware, uncovered by ESET researchers.

Tinder – Top 5 security tips

Digital dating has become more popular than ever because of apps like Tinder, but it’s not without risks. Stay safe by remembering the following tips.

WhatsApp – Top 5 security tips

WhatsApp is one of the most popular instant message apps in the world, but it’s not without security risks. Avoid the dangers with these 5 top tips.

Top 5 security resolutions for 2015

Follow these top 5 security resolutions from We Live Security to make for a safer 2015.

What is a botnet?

What is a botnet, and what can you do to prevent your computer becoming part of one?

How to spot a Facebook hoax

Hoaxes are all over Facebook so it’s vital that you know what to look out for. Keep in mind these 5 top tips when scrolling through your news feed.

How to stay safe on social media – 5 top tips

As social media becomes an increasingly large part of our everyday lives, It’s easy to forget the dangers hiding behind our feeds. So, remember these five top tips next time you login to Facebook and Twitter.

How to keep your webcam safe from hackers

Last year webcam security became a high priority after an anonymous website began posting live streams of the world’s unprotected webcams. Here are 5 top tips to keep yours safe from the hackers.

Top 5 security tips for Android Lollipop

Android Lollipop has a number of new ways to keep your data private. So, start with these top 5 tips to keep your smartphone secure.

The Biggest Hacks of 2014

There were a number of big security breaches during 2014, but which was the biggest? We count down the top 5.

How to make sure Adobe Flash is up to date

Follow these simple steps to make sure your Adobe flash player is up to date and to avoid any potential cyber attacks.

5 tips to help you stay safe on Instagram

Instagram has many settings to make sure your photos are kept safe and secure. Start with these top five tips/

Top 5 tips for safer Paypal payments

Paypal is one of the safest ways to make online payments, but there can still be security breaches if you’re not careful. Keep in mind these top 5 tips when paying online or sending money to your contacts

Ello Privacy – What you need to know

Ello Privacy was launched in March 2014 as an ad-free social network alternative, however the site still needs access to your personal data. Here’s the lowdown on the network’s key privacy principles.

Follow us

Copyright © 2017 ESET, All Rights Reserved.