Tips & advice


3182 articles

How To

How to delete your smartphone data securely before selling your device

How to delete your smartphone data securely before selling your device

How To

How to delete your smartphone data securely before selling your device

Understanding how to delete your smartphone data before selling your device is important if you want to protect your privacy and keep information secure.

Denise Giusto Bilić03 Jun 2016


Malware

Crouching Tiger, Hidden DNS

Crouching Tiger, Hidden DNS

Malware

Crouching Tiger, Hidden DNS

An interesting DNS hijack that sets the victim's computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat.

Guest Author02 Jun 2016


Cybercrime

Network ELOFANTS and other insider threat insights from the DBIR and beyond

Network ELOFANTS and other insider threat insights from the DBIR and beyond

Cybercrime

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an "Employee Left Or Fired, Access Not Terminated" and these ghost account insiders can undermine your organization's information security, as recent DBIR stats suggest.

Stephen Cobb02 Jun 2016


Kids Online

Children’s Day advice: The risks looming in cyberspace

Children’s Day advice: The risks looming in cyberspace

Kids Online

Children’s Day advice: The risks looming in cyberspace

For many parents, especially those who aren't digital natives, recognizing risks that loom in cyberspace is not easy. This guide helps point to some of the main threats.

Ondrej Kubovič01 Jun 2016


Privacy, Cybercrime

65 million Tumblr users should probably be careful...

65 million Tumblr users should probably be careful...

Privacy, Cybercrime

65 million Tumblr users should probably be careful...

65 million Tumblr users have had their details compromised as a result of a recently-discovered breach dating back to 2013. But it's not just their passwords that they should be concerned about.

Graham Cluley30 May 2016


Digital Security

What the CISSP? 20 years as a Certified Information Systems Security Professional

What the CISSP? 20 years as a Certified Information Systems Security Professional

Digital Security

What the CISSP? 20 years as a Certified Information Systems Security Professional

Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.

Stephen Cobb28 May 2016


Ransomware

Another malware wave hits Europe, mainly downloading Locky ransomware

Another malware wave hits Europe, mainly downloading Locky ransomware

Ransomware

Another malware wave hits Europe, mainly downloading Locky ransomware

ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries.

Ondrej Kubovič26 May 2016


Scams

Beware Burger King WhatsApp scam: It's a trap

Beware Burger King WhatsApp scam: It's a trap

Scams

Beware Burger King WhatsApp scam: It's a trap

Just when it seemed that the recent raft of WhatsApp scams were coming to a close, we have discovered a new one. This time it involves Burger King.

Lucas Paus26 May 2016


Privacy

GDPR Day: countdown to a global privacy and security regimen?

GDPR Day: countdown to a global privacy and security regimen?

Privacy

GDPR Day: countdown to a global privacy and security regimen?

This thing called GDPR will impact data security and privacy policy at many US firms when it takes effect two years from today. Start learning what the EU General Data Protection Regulation means to your business.

Stephen Cobb25 May 2016