How to


173 articles

Greetings, Android! 12 tips to toughen up your new device for the real world

Greetings, Android! 12 tips to toughen up your new device for the real world

Greetings, Android! 12 tips to toughen up your new device for the real world

ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 - so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google's OS...

Rob Waugh01 Jan 2014


Target breached: 5 defensive steps shoppers should take now

Target breached: 5 defensive steps shoppers should take now

Target breached: 5 defensive steps shoppers should take now

Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.

Lysa Myers19 Dec 2013


Exploit Protection for Microsoft Windows

Exploit Protection for Microsoft Windows

Exploit Protection for Microsoft Windows

we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen their defenses.

Guest Author13 Dec 2013


When it just doesn't click: How to date online without being scammed

When it just doesn't click: How to date online without being scammed

When it just doesn't click: How to date online without being scammed

Few things are sacred to today’ cybercriminals - and true love certainly isn’t one of them. Dating scams are a fast-growing area of cybercrime - rising by a third year-on-year in some countries, and ranging from fraud, to identity theft to malware attacks. Here's how to stay safe.

Rob Waugh10 Dec 2013


Can you hear us now? ESET researchers podcast every week

Can you hear us now? ESET researchers podcast every week

Can you hear us now? ESET researchers podcast every week

Have you checked out the weekly podcast by ESET security researchers? It's called the ESET Malware Report and it covers many security and privacy topics in handy 5 to 10 minute audio interviews.

Aryeh Goretsky09 Dec 2013


Why "crypto" isn't just for spies: A beginner's guide to keeping secrets

Why "crypto" isn't just for spies: A beginner's guide to keeping secrets

Why "crypto" isn't just for spies: A beginner's guide to keeping secrets

For years, "encryption" has sounded like James Bond technology to many PC users - but new systems have made "crypto" technology easier to use, and a great way to protect the files you REALLY value.

Rob Waugh06 Dec 2013


Why your small business needs an information security policy and a WISP

Why your small business needs an information security policy and a WISP

Why your small business needs an information security policy and a WISP

Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.

Stephen Cobb04 Dec 2013


Social media safety: top five tips

Social media safety: top five tips

Social media safety: top five tips

Social media sites like Facebook and Twitter are great, but use them with caution. We Live Security has five tips to keep you safe.

Alan Martin29 Nov 2013


Cash - or crash? Tips and tricks for using Bitcoin safely

Cash - or crash? Tips and tricks for using Bitcoin safely

Cash - or crash? Tips and tricks for using Bitcoin safely

Despite the heists against Bitcoin sites, plus high-profile law-enforcement actions against ‘dark market’ sites such as Silk Road, which conducted transactions in Bitcoin, the currency is soaring. We asked ESET experts, and finance advisors, for tips on how to stay safe.

Rob Waugh29 Nov 2013