How much higher are the odds that your device will be exposed to malware if you download apps from outside Google Play or if you use one of Android’s older versions? Google has the numbers. You need to stick to Google Play for apps and run as recent a version of Android as possible if … More Google’s data charts path to avoiding malware on Android
Striking the balance between supply, demand and safety is a major concern. With the pressure to ship as early as possible, especially when it comes to hardware, what assurances do we have that the hardware is really clean, and that future updates won’t be hacked? Here at Virus Bulletin 2018, the conversation of how to … More Virus Bulletin 2018: Supply chain hacking grows up
The final few months of 2018 will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks. The final stretch of 2018 approaches. For parents of young children, this means that lunch boxes and homework are back. It is also … More Top tips for protecting your Smart TV
Two-factor authentication is an underutilized security measure in businesses, yet it can greatly improve the security of an account. it is also recommended as one of the key factors in helping keep data secure in compliance with GDPR. Receiving an extra code to your phone when signing in, is a great obstacle for would-be hackers … More Google Gmail’s Two-Factor Authentication. Know how to set it up? It’s easy!
Security researchers have demonstrated how attackers could cause physical damage to hard drives, and cause PCs to crash, just by playing sounds through a computer’s speaker. A denial-of-service (DoS) attack against your organisation’s website is bad enough, preventing customers from reaching your online presence and perhaps preventing you from processing new orders – but imagine the chaos … More An acoustic attack can blue screen your Windows computer
Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices
ESET, the leading IT security vendor based in the European Union, will launch its latest IoT security solutions and share groundbreaking research into the security and privacy implications of smart homes and devices at Mobile World Congress (MWC) – taking place February 26 – March 1, 2018 in Barcelona. Exhibiting in Hall 7, booth 7H41, … More ESET to expose latest security and privacy risks of smart home devices at Mobile World Congress 2018