Tips & advice


3182 articles

Cybercrime

USBee: how to spy on an isolated system with a USB

USBee: how to spy on an isolated system with a USB

Cybercrime

USBee: how to spy on an isolated system with a USB

USBee is a form of "air gap attack". It uses a USB device to transmit the information the attacker wants to steal at frequencies between 240 and 480Mhz.

Josep Albors26 Sep 2016


Mobile Security

8 years of Android: malware, malicious apps, and how to stay safe

8 years of Android: malware, malicious apps, and how to stay safe

Mobile Security

8 years of Android: malware, malicious apps, and how to stay safe

At eight years old, Android is hugely popular. Both with users and attackers.

Ondrej Kubovič23 Sep 2016


Privacy

Internet of targets: Webcams and routers in the crosshairs of bad guys

Internet of targets: Webcams and routers in the crosshairs of bad guys

Privacy

Internet of targets: Webcams and routers in the crosshairs of bad guys

Video rules the internet today and webcams are built into practically every new laptop, smartphone and tablet. It's important to keep them secure.

Ondrej Kubovič15 Sep 2016


Ransomware

How encryption molded crypto-ransomware

How encryption molded crypto-ransomware

Ransomware

How encryption molded crypto-ransomware

Recently ESET has seen significantly increasing volumes of a particular type of ransomware known as crypto-ransomware, reports Cassius Puodzius.

Cassius Puodzius13 Sep 2016


Kids Online

At what age should kids be able to access online services?

At what age should kids be able to access online services?

Kids Online

At what age should kids be able to access online services?

In this article, ESET's Miguel Ángel Mendoza asks: "At what age should kids be able to access online services?"

Miguel Ángel Mendoza12 Sep 2016


How To

How to avoid certificate pinning in the latest versions of Android

How to avoid certificate pinning in the latest versions of Android

How To

How to avoid certificate pinning in the latest versions of Android

In this feature, ESET's Denise Giusto Bilić offers a detailed overview as to how to avoid certificate pinning in the latest versions of Android.

Denise Giusto Bilić08 Sep 2016


Digital Security

Business security: Securing your data weak points

Business security: Securing your data weak points

Digital Security

Business security: Securing your data weak points

One of the biggest problems to overcome for business security is trying to work out what areas you need to secure, explains ESET's Mark James.

Mark James08 Sep 2016


Ransomware

The economics of ransomware recovery

The economics of ransomware recovery

Ransomware

The economics of ransomware recovery

When it comes to ransomware, the question of 'to pay or not to pay' is the source of some debate. WeLiveSecurity takes a closer look at the economics.

David Harley07 Sep 2016


Ransomware

School ransomware: A threat to be aware of

School ransomware: A threat to be aware of

Ransomware

School ransomware: A threat to be aware of

Ransomware that targets schools is a threat that needs to be understood, explains ESET's Lysa Myers. Top cybersecurity efforts are needed to keep it at bay.

Lysa Myers06 Sep 2016