I’ve created an NFT so you don’t have to – here’s the good, the bad and the intangible of the hot-ticket tokens First, a quick primer: non-fungible tokens, or NFTs, are unique tokens stored on a blockchain, which is a form of digital ledger, and they cannot be modified or replaced with another token. NFTs
Cyber Security
ESET research shows yet again that macOS is not immune to malware and why some users can benefit from Apple’s Lockdown Mode This week, ESET researchers published their findings about a piece of malware that targets Mac users. Called CloudMensis, this previously unknown backdoor spies on users of the compromised Mac devices and collects information
Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices At this year’s RSA Conference in San Francisco, the speakers and vendors on the expo floor often presented artificial intelligence as the solution that can help the cybersecurity
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs In April 2022, ESET researchers discovered a previously unknown macOS backdoor that spies on users of the compromised Mac and exclusively uses public cloud storage services to communicate back and forth with its
Why downloading pirated video games may ultimately cost you dearly and how to stay safe while gaming online Video games can be expensive, so downloading popular games for free instead of parting with your hard-earned cash may sound like a great idea. But are you aware of the dangers that downloading pirated video games and
The heavyweights are now moving into API security, cementing it as “A Thing” As swarms of IoT gear, seeking richer data retrieval from their cloud mother ships, the more robust – and more potentially dangerously hackable – API interfaces get a fresh push toward center stage. With Google’s API security initiative Apigee, API security is
In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers Cybersecurity is a cornerstone of today’s digital society, and progress and development in this field wouldn’t be possible without collaboration and the sharing of information on the latest cyberthreats. Such information exchange between various stakeholders from the
It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games Revenue in the global video games market is set to grow by nearly 11% this year to reach almost $209bn. But when we see this much growth, revenue and users concentrated in one place, there
Scammers don’t take the summer off – be on your guard when buying your Crit’Air sticker If you drive your own vehicle in certain regions of France at certain times, you will need to purchase a special ‘clean air sticker’ called Crit’Air or risk facing a fine from the French government. Similar schemes already exist
Vacations are a great time to unwind, but if you’re not careful, you may face a digital disaster. Here’s how to keep your devices and data secure while you’re on the move Vacations are the perfect time to unwind, but if you’re not careful, you may face a digital disaster. Being outside of their normal
Here’s what to watch out for when buying or selling stuff on the online marketplace and how to tell if you’re being scammed Last year, Facebook Marketplace passed one billion global users. In so doing, it’s become a giant of the consumer-to-consumer space, allowing individual Facebook users to buy from and sell to each other
One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay? We all know cyber is a critical element of business risk. But how critical? Some boardrooms seem to pay little more than lip service to security and still manage to avoid serious repercussions. That’s
The lead-up to the Canada Day festivities has brought a tax scam with it Even though the deadline to file taxes in Canada already passed on May 2nd, 2022, some people may have filed late or are still expecting their refund. Perhaps that’s why I received a phishing email yesterday purporting to come from the
As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you’re dealing with a scam? Scammers recently launched a campaign on WhatsApp where they trick unsuspecting victims into thinking that they qualify for a cash prize from Costco in exchange for taking a simple survey. Obviously this type
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is WhatsApp users should watch out for a scam that lures victims with the promise of cash rewards from retail giant Costco in return for completing a
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture European business leadership, especially CISOs, CTOs, and chief data officers (CDOs), are adjusting to the fact that the war in Ukraine is a war in Europe and has global implications. Sanctions, military aid, and even incoming refugees are
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe The cybercrime underground is a well-oiled machine worth trillions of dollars annually. On dark web sites hidden from law enforcers and most consumers, cybercriminals buy and sell huge quantities of
As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone’s age on the internet? Instagram – which has come under fire in recent years over its potential impact on the mental health of teens – has just announced that it’s testing a new tool for
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask Enjoying life in the digital world comes at a cost: our privacy. Every website we visit, where we are, how much we spend, and what cards we’re paying with – this is just some of the information about you
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders Security by design has long been something of a holy grail for cybersecurity professionals. It’s a simple concept: ensure products are designed to be as secure as possible in order to minimize the chances of compromise further down the
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money Coined during Al Capone’s times, the term ”money laundering” has since entered the general lexicon as criminals have been busy obscuring the source of their ill-gotten assets and making it appear as if the funds have come from
As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam According to the latest ESET Threat Report, email threats grew by 37 percent in the first four months of the year compared to the last four months of 2021. This was also the largest
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents? One of the key findings from the ESET Threat Report T1 2022 is that the Emotet botnet has risen, Phoenix-like, from the ashes, pumping out vast amounts of
How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer At the RSA Conference 2022, the techno-geekery center of the security universe, the halls once more pulse with herds of real aching-feet attendees slurping up whatever promises to be the
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids On June 12th 2017, ESET researchers published their findings about unique malware that was capable of causing a widespread blackout. Industroyer, as they named it, was the first known piece of malware that was
Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission For understandable reasons, health delivery organizations center their focus on helping sick people, rather than on fiddling with information technology. Technology is seen as frictional annoyance to be managed in pursuit of their primary goal, so it
API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly In the rush to integrate, these lightly defended computer-to-computer portals allow rapid data transfer between systems to enrich and display data across your digital fabric. But the lightly defended part can allow vast vacuuming up of data by
Here are three themes that stood out at the world’s largest gathering of cybersecurity professionals Having just come back from the RSA Conference 2022, Tony looks at three themes that stood out to him at the world’s largest gathering of cybersecurity professionals: the shortage of cybersecurity talent and its ramifications how technology companies attempt to
Digital fiddling somehow got mixed up in a real war This year at the RSA Conference, it’s hard to shake off the fact that all this digital fiddling somehow got mixed up in a real war. I imagine this sort of fantasy where techno purveyors never really thought the cool stuff they were doing would
Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk There’s an old adage in cybersecurity that humans are the weakest link in the security chain. That’s increasingly true, as threat actors compete to exploit credulous or careless employees. But
- « Previous Page
- 1
- …
- 10
- 11
- 12
- 13
- 14
- …
- 19
- Next Page »