Tips & advice


3182 articles

Malware

Porn clicker trojans keep flooding Google Play

Porn clicker trojans keep flooding Google Play

Malware

Porn clicker trojans keep flooding Google Play

ESET researchers have found 343 malicious porn clicker trojans on Google Play over the last seven months – and their numbers keep rising.

Peter Stancik24 Feb 2016


Malware

Android porn clicker on Google Play: Appendix

Android porn clicker on Google Play: Appendix

Malware

Android porn clicker on Google Play: Appendix

Editor23 Feb 2016


Kids Online

Digital childhoods: How different nations bring up their kids

Digital childhoods: How different nations bring up their kids

Kids Online

Digital childhoods: How different nations bring up their kids

ESET has looked deeper into what parents in the United States, Germany, the United Kingdom and Russia regard as the appropriate age for digital activities.

Ondrej Kubovič23 Feb 2016


Kids Online

4 internet-savvy countries agree: Kids go digital too early

4 internet-savvy countries agree: Kids go digital too early

Kids Online

4 internet-savvy countries agree: Kids go digital too early

Online surveys by ESET show that a majority of parents in Russia, the United Kingdom, Germany and the United States are not at all happy about their children going digital too early.

Ondrej Kubovič23 Feb 2016


Privacy

Healthcare data breaches lead patients to withhold information from doctors

Healthcare data breaches lead patients to withhold information from doctors

Privacy

Healthcare data breaches lead patients to withhold information from doctors

New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the security or privacy of medical records, undermining treatment.

Stephen Cobb18 Feb 2016


Cybercrime

How the threat experts see it ...

How the threat experts see it ...

Cybercrime

How the threat experts see it ...

A unique survey among threat experts has revealed that most cyberattacks against a typical IT infrastructure take less than 24 hours to plan and execute, and almost half are successful.

Peter Stancik18 Feb 2016


Digital Security

How is cryptography incorporated into PoS terminals?

How is cryptography incorporated into PoS terminals?

Digital Security

How is cryptography incorporated into PoS terminals?

Whenever there is information that needs to be protected, there is a need to use cryptographic solutions. POS applications are no exception explains ESET's Lucas Paus.

Lucas Paus17 Feb 2016


Privacy

How to bypass this LG smartphone's fingerprint security in just 30 seconds

How to bypass this LG smartphone's fingerprint security in just 30 seconds

Privacy

How to bypass this LG smartphone's fingerprint security in just 30 seconds

A troubling vulnerability has been uncovered that may make you think twice about ever even temporarily allowing a friend, partner or acquaintance to use your new LG V10 Android smartphone.

Graham Cluley16 Feb 2016


Digital Security

IT security in EMEA – ESET speaks to 1,700 experts and managers. Read the full report

IT security in EMEA – ESET speaks to 1,700 experts and managers. Read the full report

Digital Security

IT security in EMEA – ESET speaks to 1,700 experts and managers. Read the full report

The state of information security in companies in the EMEA region, and the attitudes of their IT experts and managers, by ESET.

Editor16 Feb 2016