An acoustic attack can blue screen your Windows computer

Security researchers have demonstrated how attackers could cause physical damage to hard drives, and cause PCs to crash, just by playing sounds through a computer’s speaker. A denial-of-service (DoS) attack against your organisation’s website is bad enough, preventing customers from reaching your online presence and perhaps preventing you from processing new orders – but imagine the chaos … More An acoustic attack can blue screen your Windows computer

How to start analyzing the security of your IoT devices

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices

ESET to expose latest security and privacy risks of smart home devices at Mobile World Congress 2018

ESET, the leading IT security vendor based in the European Union, will launch its latest IoT security solutions and share groundbreaking research into the security and privacy implications of smart homes and devices at Mobile World Congress (MWC) – taking place February 26 – March 1, 2018 in Barcelona. Exhibiting in Hall 7, booth 7H41, … More ESET to expose latest security and privacy risks of smart home devices at Mobile World Congress 2018

Think you have a tracker on your phone? Learn how to make your device more resilient

If you’re reading this article, it’s likely that you’re hoping for quick tips on what to do if you suspect there’s spyware or a tracker on your phone. If that is the case, you’re likely to be disappointed; there are no quick lists of things to identify or remove to make you safe again. But … More Think you have a tracker on your phone? Learn how to make your device more resilient

Five ways to check if your router is configured securely

Cybersecurity nowadays requires more (and better) protective measures than ever before. These measures range from adopting what are acknowledged as best practices, through helping end-users to stay well-informed about upcoming threats and how to avoid them, to implementing internet security technology and keeping it up to date. In a dynamic environment where threats continually evolve … More Five ways to check if your router is configured securely

Cybersecurity for journalists and the news media

Cybercrime and other forms of “cyber-badness” affect different professions in different ways. Recently I participated in a panel about the cybersecurity concerns of journalists and the news media, hosted by the Inter America Press Association (IAPA). An account of the panel was published on WeLiveSecuritylast month but in this article I want to pass along some of the … More Cybersecurity for journalists and the news media