Rough patch, or how to shut the window of (unpatched) opportunity

Simply throwing more staff at the patching problem won’t cut it, a study suggests. To paraphrase English novelist Jane Austen, it is a fact universally acknowledged that organizations must act with alacrity when it comes to applying software patches to their systems. A number of recent notorious incidents – think the WannaCryptor malware outbreak or the breach … More Rough patch, or how to shut the window of (unpatched) opportunity

How to start analyzing the security of your IoT devices

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices

Think you have a tracker on your phone? Learn how to make your device more resilient

If you’re reading this article, it’s likely that you’re hoping for quick tips on what to do if you suspect there’s spyware or a tracker on your phone. If that is the case, you’re likely to be disappointed; there are no quick lists of things to identify or remove to make you safe again. But … More Think you have a tracker on your phone? Learn how to make your device more resilient

How to secure your router to prevent IoT threats?

Earlier this year I was forced to buy a new router for my home. As it is, with so many devices to connect, the old TP Link no longer provided me with what I needed. Two computers, three cell phones, video game console, TV, Chromecast, stereo, smart lights, thermostat, smartwatch… There are 13 computers permanently … More How to secure your router to prevent IoT threats?

Malware in firmware: how to exploit a false sense of security

When it comes to cyberthreats, we in ESET-LATAM Research often see ransomware, banking trojans (especially in my home country – Brazil), botnets or worms. As a consequence, other types of dangerous malware that run inconspicuously might get less of our attention; as is the case with firmware malware or bootkits. Bootkits run before the OS … More Malware in firmware: how to exploit a false sense of security