5 reasons why GDPR was a milestone for data protection

The landmark regulation changed everyone’s mindset on how companies worldwide collect and use the personal data of EU citizens. It was May 25th, 2018, and the sun was certainly shining in many of the (then) 28 European Union member states. In the offices of many companies in (and often also outside) the EU, this was … More 5 reasons why GDPR was a milestone for data protection

Defending the data center: The time to act is now

Cyberattacks against data centers may ultimately be everyone’s problem – how prepared are their operators for the heightened risk of cyber-assaults? Why are data centers a prime target? Amid the pandemic and the rise of the remote worker, much attention in cybersecurity has shifted to the distributed workforce. The threats posed by an explosion in … More Defending the data center: The time to act is now

CaddyWiper: New wiper malware discovered in Ukraine

This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations. ESET researchers have uncovered yet another destructive data wiper that was used in attacks against organizations in Ukraine. Dubbed CaddyWiper by ESET analysts, the malware was first detected at 11.38 a.m. … More CaddyWiper: New wiper malware discovered in Ukraine

HermeticWiper: New data‑wiping malware hits Ukraine

Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites A number of organizations in Ukraine have been hit by a cyberattack that involved new data-wiping malware dubbed HermeticWiper and impacted hundreds of computers on their networks, ESET Research has found. The attack came just … More HermeticWiper: New data‑wiping malware hits Ukraine

Beyond the tick box: What to consider before agreeing to a privacy policy

The trade-off between using a free service and giving up our personal data becomes much less palatable when we think about the wider ramifications of the collection and use of our personal data. The doorbell rings, you answer, and a representative of a large company is on the doorstep offering to allow you to use … More Beyond the tick box: What to consider before agreeing to a privacy policy