search slide
search slide
pages bottom
Currently Browsing: Results for Tag "welivesecurity"

How to give your social media security an important boost

How to give your social media security an important boost Here are a few things to keep an eye out for: Different social media sites have a fairly wide variety of options available for preserving the security of your login credentials.At this point most social media sites offer some sort of two-factor authentication.

Do you know how to steer away from online banking trouble?

Do you know how to steer away from online banking trouble? Since ESET is a partner and active participant in European Cyber Security Month, October offers us a good opportunity to offer some top tips for safe and secure online banking.Before you connect to your online banking account or pay for anything online, install a reliable, multilayered and updated security solution.

Online safety tips for social media and IM fans

Online safety tips for social media and IM fans Before, browsing online meant using search engines, looking for specific content or reading articles on your favourite news websites.Nowadays, social networks, online videos and instant messaging are core to users’ online experience, and this is especially true for the younger generation.

Beware! New WhatsApp scam offering “free internet without Wi-Fi”

Beware! New WhatsApp scam offering “free internet without Wi-Fi” This particular WhatsApp scam promises users a free internet service, without needing to use Wi-Fi.Despite being complete nonsense from a technical point of view, the offer may nevertheless appear tempting to those unaware of the realities.

Ransomware: Key insights from infosec experts

Ransomware: Key insights from infosec experts Before we entangle ourselves in everything digital that this year has to offer, it’s important to heed expert advice.As recently reported; cybercrime has wriggled its way into 21st century life, wreaking a trail of havoc as it goes.

Entrust your cyber security secrets to a safe pair of hands

Entrust your cyber security secrets to a safe pair of hands Imagine, if you will, that your security is flawless, and not a single other person can access your sensitive accounts or information.How will your loved ones get past your security measures to tend to your affairs?

10 reasons why cybercriminals target smartphones

10 reasons why cybercriminals target smartphones But while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger target for cybercriminals.A smartphone knows everything about us The amount of information stored on a smartphone has skyrocketed in recent years.

Here are the top trends in Android ransomware right now

Here are the top trends in Android ransomware right now 2016 brought some interesting developments to the Android ransomware scene, seeing ransomware emerge as one of the most pressing cybersecurity issues on the mobile platform.Authors of lock-screen ransomware, as well as file-encrypting “crypto-ransomware”, used copycat techniques proven effective in desktop malware, as well as develop their own sophisticated methods specifically designed for Android users.

Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play

Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play Based on ESET’s notice, Google has removed another malicious app from its official Android app store.Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.

Young cybercriminals ‘more motivated by peer respect than financial gain’

Young cybercriminals ‘more motivated by peer respect than financial gain’ An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.In a case outlined by the report, one youngster told officers: “… it made me popular, I enjoyed the feeling … I looked up to those users with the best reputations”.

Fingerprint security & biometrics: Three major myths busted

Fingerprint security & biometrics: Three major myths busted We debunk three myths in this short feature to bring some clarity to the subject of fingerprint security.They have their own set of unique vulnerabilities, the technology can be exploited and fingerprints can be stolen (and even from photographs).