Monitoring all the events in your corporate network is big data “business.” Any observable phenomena – from logins to downloads, scripts, updates, configuration changes, etc. – happening across all the endpoints, servers, routers, switches and other infrastructure in your network can create event logs that rapidly grow to almost unimaginable mountains of data to be … More From incident to resolution: Essential steps to survive a cyberattack
As Facebook turns 16, we look at how to keep your personal information safe from prying eyes. Sixteen years, that’s how long Facebook has been around. This means that it has accompanied some of us throughout our teenage years to adulthood. Quite an achievement since websites and services tend to lose popularity over the years … More Facebook privacy settings: Protect your data with these tips
ESET researchers have discovered a malicious campaign distributing a backdoor via torrents, with Korean TV content used as a lure. Fans of Korean TV should be on the lookout for an ongoing campaign spreading malware via torrent sites, using South Korean movies and TV shows as a guise. The malware allows the attacker to connect … More Malicious campaign targets South Korean users with backdoor-laced torrents
The study found that the more time users spent on pirate sites the higher the likelihood that some type of malware would compromise their computers. It is hardly a surprise to learn that navigating to pirate websites entails a higher risk of running into malware. But a researcher from Carnegie Mellon University in Pennsylvania, US, … More Pirate websites expose users to more malware, study finds
On the surface, the internet seems to offer anything and everything you might need – on demand and for free. Children and teens especially enjoy the benefits of being able to download any song, film, book, computer program or app they want. However, even the internet has its limitations. What children consider free, might actually … More Kids & downloading. Is it safe?