The 3 Causes of Data Breaches — and How to Prevent Them

Security breaches have become a weekly occurrence in the news cycle, which has caused businesses to start asking questions. How are they happening? Is my business at risk? The short answer is yes, your business is at risk. Here’s an overview on how data breaches occur, why they’re on the rise, and what steps to … More The 3 Causes of Data Breaches — and How to Prevent Them

Growth of cybercrime is ‘ruthless’

Cybercrime has established itself as a permanent fixture in 21st century life, with the number of incidents and victims continuing to rise with dogged determination. This is according to a new report from Europol, which stated that this “relentless growth” is being fuelled by an increase in the number of cybercriminals and the highly profitable … More Growth of cybercrime is ‘ruthless’

ESET Achieved the Best Score in VBSpam Test for the Fifth Consecutive Time

ESET Mail Security reached a 99.999% spam catch rate and zero false positives in Virus Bulletin’s latest VBSpam test. ESET Mail Security for Microsoft Exchange Server won the latest spam filtering test by leading security testing authority, Virus Bulletin, having achieved a 99.999% spam catch rate while producing zero false positives. As a result, ESET … More ESET Achieved the Best Score in VBSpam Test for the Fifth Consecutive Time

What Pippa Middleton can teach us about iCloud security

This weekend it emerged that Pippa Middleton was the latest in a long line of celebrities to have her online accounts broken into by criminals, and private photographs stolen. As The Daily Mail reports, a man who had allegedly broken into Pippa Middleton’s iCloud account was offering 3,000 private photographs of the 33-year-old socialite including … More What Pippa Middleton can teach us about iCloud security

USBee: how to spy on an isolated system with a USB

In recent years we’ve seen increasing numbers of attacks designed to affect systems which are isolated from the network and cannot be attacked using conventional methods. Almost all research into this has been carried out by experts in Israel – that comes as no great surprise since this is a country at the forefront of cybersecurity. … More USBee: how to spy on an isolated system with a USB

8 years of Android: malware, malicious apps, and how to stay safe

At eight years old, Android is hugely popular. Both with users and attackers Happy Birthday Android! It has been eight years since the Android project was officially released and introduced to the public – on September 23rd 2008 to be exact. In that short time, Google’s platform has rocked the mobile universe. As the latest … More 8 years of Android: malware, malicious apps, and how to stay safe

Half a billion Yahoo users victim to ‘biggest data breach in history’

Yahoo has confirmed that half a billion users may have had their data stolen in what has been described as the ‘biggest data breach in history’. The company said it believes that the sensitive information – which includes names, email addresses, hashed passwords and phone numbers – was stolen from its network in late 2014 … More Half a billion Yahoo users victim to ‘biggest data breach in history’