Tips & advice


3182 articles

Cybercrime

Privacy and security fears - predictably - impact US online commerce

Privacy and security fears - predictably - impact US online commerce

Cybercrime

Privacy and security fears - predictably - impact US online commerce

US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.

Stephen Cobb16 May 2016


Digital Security

Expect the unexpected: The importance of audit logging

Expect the unexpected: The importance of audit logging

Digital Security

Expect the unexpected: The importance of audit logging

ESET's Lysa Myers discusses audit logging and how it can help you track and identify security violations, performance problems, and flaws in applications.

Lysa Myers16 May 2016


Kids Online

Online safety for families across the years

Online safety for families across the years

Kids Online

Online safety for families across the years

When it comes to online safety, it can be difficult to understand what's suitable for different age groups. Our guide offers advice on how to manage this over the years.

Editor13 May 2016


Malware

Another Eurovision contestant? Even malware can 'perform music'

Another Eurovision contestant? Even malware can 'perform music'

Malware

Another Eurovision contestant? Even malware can 'perform music'

In contrast to the Eurovision contestants, malware writers try to make their creations as stealthy as possible. But thanks to unique behavior and sometimes even unintended showmanship of their malicious code, they end up in the limelight.

Ondrej Kubovič13 May 2016


How To

Exploiting 1-byte buffer overflows

Exploiting 1-byte buffer overflows

How To

Exploiting 1-byte buffer overflows

Matías Porolli shows how exploit another classic buffer overflow vulnerability, in which the ebp register is moved to execute an arbitrary code.

Matías Porolli10 May 2016


Digital Security

After authentication comes authorization and access control

After authentication comes authorization and access control

Digital Security

After authentication comes authorization and access control

In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET's Lysa Myers.

Lysa Myers10 May 2016


Kids Online

Mother’s Day comparison: Which nation has the strictest moms?

Mother’s Day comparison: Which nation has the strictest moms?

Kids Online

Mother’s Day comparison: Which nation has the strictest moms?

On Mother’s Day, ESET takes a deeper look into the results of its recent survey focusing on parenting in a digital era. We looked at how moms in the US, Germany, the UK and Russia are trying to protect their children.

Ondrej Kubovič09 May 2016


Malware

FBI: No, you shouldn't pay ransomware extortionists

FBI: No, you shouldn't pay ransomware extortionists

Malware

FBI: No, you shouldn't pay ransomware extortionists

The FBI has published a list of tips to reduce the chance of ransomware being the ruin of your company - and is keen that you don't pay the extortionists.

Graham Cluley09 May 2016


Digital Security

Data loss scenarios: Which are the most probable?

Data loss scenarios: Which are the most probable?

Digital Security

Data loss scenarios: Which are the most probable?

Research shows that running regular backups for data, as well as encrypting them, is necessary for organizations to ensure that their information is safe.

Editor06 May 2016