Tips & advice


3182 articles

Cybercrime

Game of Thrones stars' personal phone numbers leaked, as HBO hackers attempt to extort ransom

Game of Thrones stars' personal phone numbers leaked, as HBO hackers attempt to extort ransom

Cybercrime

Game of Thrones stars' personal phone numbers leaked, as HBO hackers attempt to extort ransom

A leaked document appears to contain the personal telephone numbers and email addresses for actors such as Peter Dinklage, Lena Headey and Emilia Clarke.

Graham Cluley09 Aug 2017


Privacy

What’s the cost of a free lunch?

What’s the cost of a free lunch?

Privacy

What’s the cost of a free lunch?

We all know that there is no such thing as a free lunch, or security product, so what’s the catch?

Tony Anscombe03 Aug 2017


Cybercrime

How black-hats misuse the torrent ecosystem for fun and profit

How black-hats misuse the torrent ecosystem for fun and profit

Cybercrime

How black-hats misuse the torrent ecosystem for fun and profit

Torrents have many legitimate uses, in various segments. However, their popularity among users makes them also into an attractive vector for black-hats.

Ondrej Kubovič01 Aug 2017


Mobile Security

iOS VPN apps removed from Apple's Chinese App Store

iOS VPN apps removed from Apple's Chinese App Store

Mobile Security

iOS VPN apps removed from Apple's Chinese App Store

Apple has bowed to pressure from the regime in Beijing, and removed some VPN apps from the Chinese version of its iOS App Store.

Graham Cluley30 Jul 2017


Digital Security

Are smartphones threatening the security of our IoT devices?

Are smartphones threatening the security of our IoT devices?

Digital Security

Are smartphones threatening the security of our IoT devices?

The number of IoT devices is set to surpass 20 billion by 2020. We take a look at how connected things threaten our security as cybercriminals exploit weaknesses in the smartphones that control them.

Editor28 Jul 2017


Scams

Homograph attacks: Don’t believe everything you see

Homograph attacks: Don’t believe everything you see

Scams

Homograph attacks: Don’t believe everything you see

A homograph attack is what happens when attackers register domains that are similar to the originals, with valid certificates.

Cecilia Pastorino27 Jul 2017


Digital Security

Is it safe to store corporate information on Google Drive (or similar services)?

Is it safe to store corporate information on Google Drive (or similar services)?

Digital Security

Is it safe to store corporate information on Google Drive (or similar services)?

When it comes to protecting corporate information, some doubt whether or not the cloud is the best option. We look at all the security services available.

Josep Albors26 Jul 2017


Ransomware

Social engineering and ransomware

Social engineering and ransomware

Ransomware

Social engineering and ransomware

Social engineering may play a vital part in persuading a victim to open a malicious executable or website, says ESET's David Harley on social engineering and ransomware.

David Harley25 Jul 2017


ESET Research, Mobile Security

Malware found lurking behind every app at alternative Android store

Malware found lurking behind every app at alternative Android store

ESET Research, Mobile Security

Malware found lurking behind every app at alternative Android store

ESET researchers have discovered an Android app store distributing malware on a mass scale.

Peter Stancik25 Jul 2017