Tips & advice


3182 articles

Digital Security

What does revoking Net Neutrality mean for security?

What does revoking Net Neutrality mean for security?

Digital Security

What does revoking Net Neutrality mean for security?

Imagine the scenario where an Internet Service Provider (ISP) allows a security company providing malware protection the option to pay for their traffic to be prioritized and a lower the priority level imposed on all other providers.

Tony Anscombe21 Dec 2017


Digital Security

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 2

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 2

Digital Security

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 2

Armed with the cultural theory described in part one as a possible explanation for why some people do not heed expert advice, we fielded a survey that queried US adults about their attitudes to 15 different technology hazards, including six that were cyber-related.

Stephen Cobb20 Dec 2017


Privacy

Why we should fight for Net Neutrality

Why we should fight for Net Neutrality

Privacy

Why we should fight for Net Neutrality

Granting ISPs the right to shape traffic, allowing for some traffic to be prioritized due to a commercial agreement, may have a negative effect on the outcome of using the service for both the consumer and the company providing the service.

Tony Anscombe19 Dec 2017


Digital Security

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 1

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 1

Digital Security

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 1

Again and again we have seen security breaches occur because people did not heed advice that we and other people with expertise in security have been disseminating for years, advice about secure system design, secure system operation, and appropriate security strategy.

Stephen Cobb18 Dec 2017


Cybercrime

Business Email Compromise scammer sentenced to 41 months in prison

Business Email Compromise scammer sentenced to 41 months in prison

Cybercrime

Business Email Compromise scammer sentenced to 41 months in prison

A US judge has sentenced a Nigerian man to three years and five months in a federal prison after he pleaded guilty to taking part in a business email compromise scam that targeted organisations around the world.

Graham Cluley15 Dec 2017


Digital Security

Cybersecurity Trends 2018: The costs of connection

Cybersecurity Trends 2018: The costs of connection

Digital Security

Cybersecurity Trends 2018: The costs of connection

To help the reader navigate through the maze of such threats, ESET’s thought leaders have zeroed in on several areas that top the priority list in our exercise in looking forward.

Tomáš Foltýn14 Dec 2017


Digital Security

Memes: the explanation of nearly everything - including computer viruses

Memes: the explanation of nearly everything - including computer viruses

Digital Security

Memes: the explanation of nearly everything - including computer viruses

We still don’t have a solid scientific theory of memes; nonetheless, they already allow us to understand why certain things happen the way they do. Memes are “alive”; they reproduce, mutate, and evolve according to Darwinian laws.

Guest Author13 Dec 2017


Digital Security

Enterprise security spend to continue to trend higher

Enterprise security spend to continue to trend higher

Digital Security

Enterprise security spend to continue to trend higher

A breakdown of the ‘spending pie’ shows that the ‘security services’ segment is projected to make up nearly 60% of the total IT security budgets, followed by the ‘infrastructure protection’ segment on a little over 18%.

Tomáš Foltýn12 Dec 2017


Scams

Happy holidays, scam spotters!

Happy holidays, scam spotters!

Scams

Happy holidays, scam spotters!

Businesses are often sent fake invoices and waybills which install ransomware. Teach staff to avoid these. If questionable, ask your IT dept to look at it. E-cards have been a target in the past and may be used again in holiday-themed attacked.

David Harley11 Dec 2017