Advances in ESET ransomware protection

There are a multitude of cybersecurity issues that enterprises must negotiate in the current digital landscape, including ransomware. Ransomware is a form of malicious code that blocks or encrypts the contents of a device and demands a ransom to restore access to the data. The devices in question include mobile phones and PCs but also extend to … More Advances in ESET ransomware protection

The ABCs of Anti-Phishing and Web Access Protection

Homoglyph attacks: high-value targets are protected by ESET The Cypriot security watchdog, CSIRT, warns about a fake PayPal site that spreads the Nemty ransomware using a so-called homoglyph attack. Homoglyph attacks rely on replacing characters in addresses with ones that look similar – or even optically identical – but are actually different, as they belong to different … More The ABCs of Anti-Phishing and Web Access Protection

More curious, less cautious: Protecting kids online

How we can help protect a generation for which digital is the way of the world? They’ll know how to play online games, get updates on their favorite celebrities, find the latest music hits, chat with their equally tech-savvy peers, or ask the Internet for answers to their questions that they might be too embarrassed … More More curious, less cautious: Protecting kids online

ESET works with Google to halt dangerous malware

ESET launched Chrome Cleanup, a new scanner and cleaner for Google Chrome designed to help users browse the web safely and without interruption.  Chrome Cleanup will be available for all Google Chrome users running on Windows. As cyber-attacks become more complex and difficult to spot, browsing the web can lead users to dangerous sites which … More ESET works with Google to halt dangerous malware

It’s a five out of five for ESET Endpoint Security

As threats continually evolve, so too must security.  Today, businesses need solutions that can stand up to the targeted and complex methods hackers deploy, if they are to prevent the very real prospect of falling victim to a data breach. Yet while many IT security companies claim they can deal with the changing threat landscape, … More It’s a five out of five for ESET Endpoint Security

Hi, I’m the enemy: Different perspectives on a pentest

Today we are starting a series of articles showing the different angles that can be taken when tackling a pentest. “A PENTEST RECREATES THE ACTIONS CARRIED OUT BY AN ATTACKER IN ORDER TO IDENTIFY ANY VULNERABILITIES” Let’s start by defining what that is. A pentest is an audit process that involves carrying out controlled attacks … More Hi, I’m the enemy: Different perspectives on a pentest

CyberThreats Daily: The Top Ten Commandments of Password Protection

Protecting your passwords is a vital component of keeping your online accounts safe and secure. Careless users often find themselves the victim of email or Facebook hacks.  Armed with the right information, it only takes a few moments to properly secure your email accounts, social networking profiles and sensitive, web based logins. The nice people at Facecrooks have … More CyberThreats Daily: The Top Ten Commandments of Password Protection