Award-winning news, views, and insight from the ESET security community
Privacy
UK Broadband ISPs hijacking browsers to push porn blocks
A host of UK broadband providers are hijacking people's browsers mid-session to force them into making decisions on adult content filters.
Alan Martin • 22 Dec 2014
Privacy, Cybercrime
Madonna thinks her computer was hacked
Turns out that the Material Girl has had her material stolen, and she's blaming hackers!
Graham Cluley • 22 Dec 2014
Privacy, Mobile Security
Mobile security: flaw allows hackers to read texts and listen to calls
Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.
Alan Martin • 19 Dec 2014
Uber considers biometrics in bid to improve safety
The ride-sharing app Uber has unveiled new security plans to screen drivers, helping ensure passenger safety, Engadget reports.
Alan Martin • 18 Dec 2014
Webcam security - how to lock down the cameras in your home
Our tips will help you hacker-proof anything from baby monitors to surveillance cameras - and keep your home private.
Rob Waugh • 18 Dec 2014
Privacy focused Blackphone app store in development
Blackphone - the Android smartphone that pushes privacy and security above all else - is to open an app store set to rival the Google Play marketplace.
Alan Martin • 10 Dec 2014
US announces new cybersecurity unit with a focus on prevention
The Department of Justice has announced that it is creating a dedicated cybersecurity unit, with an eye on prevention rather, reports Gizmodo.
Alan Martin • 05 Dec 2014
Phone biometric security need to be controlled, says ex-GCHQ chief
The former head of the UK's government's communications agency GCHQ has issued warnings over the privacy of the biometric security increasingly favored in top-end mobile phones and other devices, Computing reports.
Alan Martin • 01 Dec 2014
Malware, Privacy, Scams, Cybercrime
Cyber Monday - 12 tips to help you shop safely online
Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.
Rob Waugh • 27 Nov 2014