Our Security evangelist’s take on this first day of Black Hat 2022, where cyberdefense was on every mind. As day one at Black Hat USA 2022 came to an end someone asked me, ”What is your takeaway from today’s conference?” There have been several interesting presentations, and as expected a number of them detailed the
Cyber Security
The NHS was victim of a potential cyberattack, which raises the question of the impact of those data breach for the public. This week, the NHS was potentially affected by a ransomware attack, which raise the question: Why should you care if your data my have been stolen during a breach? Also, if you are
A deep-dive in Zero-trust, to help you navigate in a zero-trust world and further secure your organization. Last week, at ChannelCon in Chicago, I participated on a panel titled ‘Building trust in a Zero Trust world’ with several other industry experts. The core concept of Zero Trust is ‘trust nothing, verify everything’ and for many
Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it. Global cybercriminals make trillions of dollars each year. Much of their success comes from exploiting the mistakes that we make—by clicking on phishing links, forgetting to update critical
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization. This week, ESET’s security evangelist Tony Anscombe participated in a panel on zero-trust architecture during ChannelCon. He explains what zero-trust means, and the basic practises any organisation should implement to protect themselves. Watch the video to learn more.
Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers. “It’s a match” is now a common expression in the dating scene, and
Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer’s pc, learn the steps to protect your new PC from cyberthreats. With Windows 11 making headlines for all the right reasons, it could be a great time to invest in a new PC for the family or the
Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web. Web browsers are our gateway to the digital world. We spend hours on them each day, which makes them not only a vital tool for legitimate users, but a valuable target
Cybercriminals exploited a vulnerability to steal the equivalent of 18M$ from the NFT music streaming platform Audius, while other cyberthreats related to crypto makes the news. This week, the NFT music streaming platform Audius was the victim of a cyberattack. Criminals exploited a vulnerability to steal the equivalent of 18M$ from the platform. This type of attack
It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash For today’s consumers, convenience is king. And at the heart of the digital experiences that make our lives easier sits the
I’ve created an NFT so you don’t have to – here’s the good, the bad and the intangible of the hot-ticket tokens First, a quick primer: non-fungible tokens, or NFTs, are unique tokens stored on a blockchain, which is a form of digital ledger, and they cannot be modified or replaced with another token. NFTs
ESET research shows yet again that macOS is not immune to malware and why some users can benefit from Apple’s Lockdown Mode This week, ESET researchers published their findings about a piece of malware that targets Mac users. Called CloudMensis, this previously unknown backdoor spies on users of the compromised Mac devices and collects information
Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices At this year’s RSA Conference in San Francisco, the speakers and vendors on the expo floor often presented artificial intelligence as the solution that can help the cybersecurity
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs In April 2022, ESET researchers discovered a previously unknown macOS backdoor that spies on users of the compromised Mac and exclusively uses public cloud storage services to communicate back and forth with its
Why downloading pirated video games may ultimately cost you dearly and how to stay safe while gaming online Video games can be expensive, so downloading popular games for free instead of parting with your hard-earned cash may sound like a great idea. But are you aware of the dangers that downloading pirated video games and
The heavyweights are now moving into API security, cementing it as “A Thing” As swarms of IoT gear, seeking richer data retrieval from their cloud mother ships, the more robust – and more potentially dangerously hackable – API interfaces get a fresh push toward center stage. With Google’s API security initiative Apigee, API security is
In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers Cybersecurity is a cornerstone of today’s digital society, and progress and development in this field wouldn’t be possible without collaboration and the sharing of information on the latest cyberthreats. Such information exchange between various stakeholders from the
It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games Revenue in the global video games market is set to grow by nearly 11% this year to reach almost $209bn. But when we see this much growth, revenue and users concentrated in one place, there
Scammers don’t take the summer off – be on your guard when buying your Crit’Air sticker If you drive your own vehicle in certain regions of France at certain times, you will need to purchase a special ‘clean air sticker’ called Crit’Air or risk facing a fine from the French government. Similar schemes already exist
Vacations are a great time to unwind, but if you’re not careful, you may face a digital disaster. Here’s how to keep your devices and data secure while you’re on the move Vacations are the perfect time to unwind, but if you’re not careful, you may face a digital disaster. Being outside of their normal
Here’s what to watch out for when buying or selling stuff on the online marketplace and how to tell if you’re being scammed Last year, Facebook Marketplace passed one billion global users. In so doing, it’s become a giant of the consumer-to-consumer space, allowing individual Facebook users to buy from and sell to each other
One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay? We all know cyber is a critical element of business risk. But how critical? Some boardrooms seem to pay little more than lip service to security and still manage to avoid serious repercussions. That’s
The lead-up to the Canada Day festivities has brought a tax scam with it Even though the deadline to file taxes in Canada already passed on May 2nd, 2022, some people may have filed late or are still expecting their refund. Perhaps that’s why I received a phishing email yesterday purporting to come from the
As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you’re dealing with a scam? Scammers recently launched a campaign on WhatsApp where they trick unsuspecting victims into thinking that they qualify for a cash prize from Costco in exchange for taking a simple survey. Obviously this type
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is WhatsApp users should watch out for a scam that lures victims with the promise of cash rewards from retail giant Costco in return for completing a
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture European business leadership, especially CISOs, CTOs, and chief data officers (CDOs), are adjusting to the fact that the war in Ukraine is a war in Europe and has global implications. Sanctions, military aid, and even incoming refugees are
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe The cybercrime underground is a well-oiled machine worth trillions of dollars annually. On dark web sites hidden from law enforcers and most consumers, cybercriminals buy and sell huge quantities of
As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone’s age on the internet? Instagram – which has come under fire in recent years over its potential impact on the mental health of teens – has just announced that it’s testing a new tool for
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask Enjoying life in the digital world comes at a cost: our privacy. Every website we visit, where we are, how much we spend, and what cards we’re paying with – this is just some of the information about you
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders Security by design has long been something of a holy grail for cybersecurity professionals. It’s a simple concept: ensure products are designed to be as secure as possible in order to minimize the chances of compromise further down the
- « Previous Page
- 1
- …
- 14
- 15
- 16
- 17
- 18
- …
- 21
- Next Page »