Editor

Editor


WeLiveSecurity Content Team


540 articles by Editor

Less Technical

BlackEnergy and the Ukrainian power outage: What we really know

BlackEnergy and the Ukrainian power outage: What we really know

Less Technical

BlackEnergy and the Ukrainian power outage: What we really know

Robert Lipovsky, a senior malware researcher at ESET, offers his expert insight into the recent discovery of BlackEnergy malware in Ukrainian energy distribution companies.

Editor11 Jan 20165 min. read


The security review: BlackEnergy, CES 2016 and Windows 10

The security review: BlackEnergy, CES 2016 and Windows 10

The security review: BlackEnergy, CES 2016 and Windows 10

Highlights from the last seven days in information security include the return of the BlackEnergy trojan and security insights from CES 2016.

Editor11 Jan 20162 min. read


Less Technical

5 of the most devastating data breaches of 2015

5 of the most devastating data breaches of 2015

Less Technical

5 of the most devastating data breaches of 2015

Data breaches got bigger, brasher and more devastating in 2015. In this feature, we look at how some of the biggest came about and the impact they had.

Editor07 Jan 20164 min. read


Less Technical

5 things you need to know about social engineering

5 things you need to know about social engineering

Less Technical

5 things you need to know about social engineering

Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. However, little is known about this tactic. This feature discusses some key aspects.

Editor30 Dec 20154 min. read


Ransomware rearing its ugly head, goes after business

Ransomware rearing its ugly head, goes after business

Ransomware rearing its ugly head, goes after business

Ransomware is the latest tool in the cybercriminal’s arsenal, but it has to date largely been used to target consumers. Could it now be used to hit banks and other financial institutions too?

Editor28 Dec 20154 min. read


Less Technical

Why online gaming is the new frontier for cybercrime

Why online gaming is the new frontier for cybercrime

Less Technical

Why online gaming is the new frontier for cybercrime

Online gaming and cybercrime are more connected than you might think. We explore how online games are becoming the new hunting ground for cybercriminals looking to earn and learn.

Editor24 Dec 20154 min. read


The security review: Nemucod malware, Star Wars and China on cyber sovereignty

The security review: Nemucod malware, Star Wars and China on cyber sovereignty

The security review: Nemucod malware, Star Wars and China on cyber sovereignty

Our latest recap of the last seven days in information security includes the spread of the Nemucod trojan, the importance of improving awareness of online safety in children and young people and how Star Wars offers plenty of top cyber advice.

Editor21 Dec 20153 min. read


Less Technical

Star Wars: A New Hope – 5 information security lessons

Star Wars: A New Hope – 5 information security lessons

Less Technical

Star Wars: A New Hope – 5 information security lessons

If you are looking to boost your cybersecurity prowess, then make some time for the first Star Wars film, A New Hope. You'd be surprised at what this hugely popular and successful movie has to offer.

Editor17 Dec 20155 min. read


Kids Online

Australian parents’ concerns differ from kids’ actual behavior online

Australian parents’ concerns differ from kids’ actual behavior online

Kids Online

Australian parents’ concerns differ from kids’ actual behavior online

When it comes to protecting your children online, knowledge of risks is vital. With this in mind, ESET asked Australian parents about their main concerns.

Editor17 Dec 20152 min. read