Award-winning news, views, and insight from the ESET security community
WeLiveSecurity Content Team
Less Technical
Is biometrics the future of secure payments?
The security review: Virtualization, diversity and encryption
The security review: ammyy.com malware, child safety in the digital age and email security boost
7 things you need to know about car hacking
Is the idea of biometrics as a secure payment system a fad, fiction or fact? This feature looks at whether DNA is linked with our digital identity.
Editor • 23 Nov 2015 • 3 min. read
Get up-to-date with the latest happenings in information security with our review of the past week.
Not quite sure what were the most interesting and intriguing information security stories of the past week? Not to worry – the security review has you covered.
Editor • 16 Nov 2015 • 3 min. read
Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely to happen much more regularly in the future. We look at the top facts you need to know about this emerging trend.
Editor • 13 Nov 2015 • 6 min. read
Kids Online
Child safety in a digital age
Editor • 12 Nov 2015 • 0 min. read
Comcast resets 200,000 cleartext passwords that were up for sale online
Comcast resets customer account details after it found out that information was being sold on the dark web.
Editor • 11 Nov 2015 • 2 min. read
Cybercrime
Social media savvy students 'better at avoiding cybercrime'
A new study finds that current university students have a mature approach to social media that helps keep them safe from cybercrime.
Editor • 10 Nov 2015 • 1 min. read
The security review: Industrie 4.0, Schrödinger’s Cat and weakening encryption
This week’s roundup of the past seven days includes a interesting piece on Industrie 4.0, Schrödinger’s antivirus, proposals to weaken encryption and much more.
Editor • 09 Nov 2015 • 3 min. read
Why mobile security is more important than ever before
In this feature we explore why mobile security is of the utmost importance for individuals and organizations. If smartphones and tablets not adequately protected, they are extremely vulnerable to being exploited.
Editor • 06 Nov 2015 • 4 min. read