What has the journey of the World Wide Web been like so far, as seen and experienced by ESET’s security folk? ESET Senior Research Fellow David Harley provides his take in the first installment of our series of interviews marking the Web’s 27th birthday. On August 6, 1991, English computer scientist Tim Berners-Lee publicly announced … More Interviewing ESET’s experts about the Web’s journey so far
WeLiveSecurity sat down with David Harley to get a better understanding of Critical Infrastructure and the role he has played in the area throughout his career. [Editor] How did you come to be involved with Critical Infrastructure? [David Harley] I first took an interest in Critical Infrastructure (CI) when I started working on the security side … More Critical Infrastructure Interview with cyber-expert David Harley
More focus on how to spot social engineering attacks is needed in organizations, according to an expert. Jenny Radcliffe, who specializes in the “psychology” of this technique, said that organizations now have to move on from social engineering awareness, reported Computer Weekly. Speaking at the inaugural Security Serious Conference in London this week, Radcliffe explained … More Organizations ‘need to deliver social engineering training’
…which seems to have taken a hit recently. In fact, several hits, at any rate in terms of DDoS (distributed denial of service) attacks. The Irish Independent reports Multiple government websites down as servers under ‘DDoS attack’. John Leyden, writing for The Register, has also followed the story/stories, with his most recent (at the time … More DDoS and the Luck of the Irish…
Every May 17th is World Telecommunication and Information Society Day, which attempts to raise global awareness on how the Internet and new technologies changed our society, and the opportunities they gave to improve our lifestyle. This special date, also known as Internet Day in some Spanish-speaking countries, is an opportunity for us at ESET to celebrate its … More How did the Internet change the everyday work of a security researcher?