Technology news from the future
These search results are from across the Techday Network of sites
Heard of Jackware? When connected cars meet ransomware
I define jackware as malicious software that seeks to take control of a device, the purpose of which is not data processing or digital communications.
Data loss explained - Five reasons why your company could be next
Security firm ESET claims that for most companies, data is the most precious asset they have - when it’s lost, the cost can be catastrophic.
ESET picks up 95th VB100 award for NOD32 Antivirus
The independent testing authority published its first comparative review of business and consumer products on Windows 10 Pro 64-bit.
In-flight wi-fi may be coming, but you can't be flippant about security
In-flight wi-fi is coming to all Australian budget carriers by mid 2017, but it does come with the same risks as any public wi-fi networks.
Fake apps on Google Play tricked users into paying
Many malicious developers try to trick users into downloading their apps by creating the illusion of a useful application.
Japanese smartphone users all cybersecurity talk, but no action
Japanese smartphone users might know more about cyber security, but that doesn't mean they're any safer, according to new research from ESET.
And winner for the best Mac security solution is…
Are you a Mac user? Apple’s offerings claim a substantial part of the market, and thus it is always good to know which security solution is best.
New malware steals passwords from OS X keychain
OSX/Keydnap is reportedly a Trojan stealing passwords and keys out of OS X keychains, while creating a permanent backdoor.
Types of VPN networks and how they work: Do you know which kind to use?
No doubt you are already aware of the importance of using VPN networks to guarantee the privacy of your information
Ransomware: First files … now complete devices
Recently, a particular type of malware, has become increasingly troublesome for both businesses and home users. It is is known as ransomware.
Digital patch kit: How to protect yourself from data leaks
In this piece we look at four key approaches that will plug any gaping holes in your defences.
Malicious scripts in compromised websites - and how to protect yourself
People often highlight those threats that are more or less predictable, but the most dangerous are scripts that are hard for users to detect.
10 tips for staying cyber-safe when on the road
Here is a short guide that we have refreshed to help you travel safely and keep all your data and devices protected.
Kiwi and Aussie workers' security attitudes concerning, says ESET
“Weak cybersecurity behaviours on personal devices can lead to ease of identity theft, ransomware attacks, phishing, and more."
Windows 10 security and privacy: An in-depth review and analysis
As Windows 10 approaches its one year anniversary, it is interesting to take a look at how far the operating system has come.
Do you know if your child is being cyberbullied? These are the red flags
ESET has put together a list of indicators that help parents recognise whether their offspring are being cyberbullied.
Wi-Fi and connected devices increase security risks
"The increase in connected devices means the need for more Wi-Fi technologies as well as a possible increase of related-risks."
Quantum Computation: A cryptography armageddon?
A fairly surprising statement: all major cryptographic algorithms in use today are (virtually) broken!
Hitting emails and Facebook: Ray-Ban scam is back
"We would like to advise users to be extra careful and pay attention when dealing with offers promising high discounts or cheap branded goods."
ESET a lightweight among internet security products
ESET has topped a new security product system performance test by AV-Comparatives, with one of its offerings among the lightest tested.
Windows flaw enhances DNS hijacking
“Hopefully, Microsoft will address this issue in future versions of Windows. Until then, users should be aware of the possibility of DNS hijacking."
1 in 5 Australians using pirated software: What ESET thinks
Businesses of all sizes should be proactively prohibiting the use of illegal or unlicensed software.
Expert insight from the author of the ESET TeslaCrypt decryptor
ESET recently interviewed the malware researcher who ultimately created the universal ESET TeslaCrypt decryption tool.
117 million LinkedIn members compromised by 2012 data breach
"Worryingly, this trove of information is not thought to have been obtained from a recent data breach."