Responding to news of health insurer Premera Blue Cross data breach, exposing the financial and health records of 11 million…
Browsing: Malware and Vulnerabilities
Almost seven years ago, I sat in a steakhouse in Manhattan listening to Jeremiah Grossman of WhiteHat Security hold forth…
Yahoo announced a new method of authentication for its services that relies solely on an on-demand generated password that is…
ESET has conducted a survey on social media of smartphone usage ahead of the Mobile World Congress with interesting conclusions:…
The subject of mobile payments has been hitting the headlines recently, with the launch from Google of Android Pay at…
When people think about securing their network, the term “identity and access governance” (IAG) might not come to mind. Most…
These days, cyber crime is a lucrative business, and cyber criminals take their time to investigate their potential target before…
Nation-state sponsored Cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex, modular tools, and keeping well under the…
ESET Ireland advises Apple fans keen to get their hands on the Apple Watch to think before they click, after hackers…
Second Annual “Security Pressures Report” Measures Pressures from Advanced Malware Threats, to Resource Constraints to Executive Demands and More