June 27, 2012 | San Diego, CA

How much will your driverless car know about you (and who will it tell)?

Following the flurry of press coverage surrounding the proposed next generation of driverless cars, privacy groups are asking questions about what will happen to the data the cars (necessarily) collect, which – in the wrong hands – might prove tempting for abuse.My colleague Stephen Cobb points out a current example in the automotive data gathering realm where Progressive Insurance goes to great lengths to be specific about what data they collect with their Snapshot product, which plugs into your car diagnostic port. They also try to reassure drivers that bad things won’t happen to the data once it’s collected, though they mention it may be used for “research.”The typical assurances against private tracking data going rogue are usually that they’re anonymized.

June 20, 2012 | San Diego, CA

Data security and digital privacy on the road, what travelers should know

Summer is here and for many families that means travels plans, but do your summer travel plans include taking care of your data and digital devices? Which digital devices do you plan to take on your trip and what sort of data do they contain? Perhaps more importantly: What kind of data can they access? These are important questions to think about because these days your data and devices are targets for thieves of all kinds, at all times, including when you're on vacation. In a moment I will have some tips on thwarting the bad guys, but first, think about this: What would happen if someone stole your smartphone or that company laptop you thought you needed to take along on the family sightseeing trip?Quite frankly, if you could get hold of my iPhone and by-pass the security code you could access a lot of personal data about me. If you could also guess my passwords you could get to my bank account. On top of all that you could use my email to fake messages from me and pretend to be me on Facebook and Twitter.

June 14, 2012 | San Diego, CA

The negative impact on GDP of state-sponsored malware like Stuxnet and Flame

The slow drip of revelations about Flame have kept this piece of malware in the news for more than two weeks so it is worth reminding people that most antivirus programs now protect against Flame (ESET products detect it as Win32/Flamer.A). The coverage of Flame was boosted last week by a conveniently-timed assist from leaks that put Stuxnet back in the headlines.Frankly, many antivirus experts were underwhelmed by reports that anonymous officials in the U.

June 7, 2012 | San Diego, CA

Passwords and PINs: the worst choices

At a time when password breaches like the one at LinkedIn are once more making the news, there's plenty of good advice around about how to select a strong password as opposed to the sort of stereotyped easy-to-remember-but-stupendously-easy-to-guess password that turns up again and again in dumped lists of hacked passwords. So if your favourite, much-used password (or something very like it) is in the following list, it might be a good idea to stop reading this now, go to the link on how to select a strong password and use it as a basis for changing all your passwords to something safer (then come back and think about the PINs you use). The list is abstracted from one compiled by Mark Burnett, representing the most-used passwords in a data set of around 6 million:password123456123456781234qwerty12345dragonpussybaseballfootballletmeinmonkey696969abc123mustangmichaelshadowmasterjennifer1111112000jordansupermanharley1234567I've included the top 25 because it amused me to see my own name at number 24. I suspect, though, that has more to do with motorcycles than my own superstar status.

May 29, 2012 | San Diego, CA

Win32/Flamer: the 21st Century Whale

It’s not only the malware ESET calls Win32/Flamer.A which is complex (and certainly dauntingly large).It's understandable that what appears to be a sophisticated threat found in in several regions, some of them particularly politically sensitive, has excited so much interest. However, conflicting conjecture and confusion over the ‘ownership’ of the detection is muddying the waters somewhat.

May 29, 2012 | Bratislava

ESET Launches Next Generation Business Endpoint Solutions: ESET Endpoint Antivirus and ESET Endpoint Security with Web Control

ESET, the leader in proactive protection celebrating 25 years of its technology this year, today announced the launch of a new line of products for business customers – ESET Endpoint Security and ESET Endpoint Antivirus. With the new product line, ESET is strengthening its focus on the business segment. Both ESET Endpoint Antivirus and ESET Endpoint Security come standard with ESET Remote Administrator. The more feature-rich ESET Endpoint Security adds Web Control, Two-way Firewall and Client Antispam.

May 17, 2012 | Bratislava

ESET Releases BETA Versions of ESET NOD32 Antivirus 6 and ESET Smart Security 6 with Anti-Theft

ESET, the leader in proactive protection against cyber-threats, today announced the start of public BETA testing of its flagship products − ESET Smart Security 6 BETA and ESET NOD32 Antivirus 6 BETA. The Anti-Theft feature that helps locate missing laptops and monitors activity on stolen devices will be available in both products during the BETA stage to reach as many testers as possible. ESET BETA Program is a final phase in the release process when products are available for testing to the general public. Both ESET Smart Security 6 and ESET NOD32 Antivirus 6 are available for free download.

May 12, 2012 | San Diego, CA

11 Tips for protecting your data when you travel

When we relayed the FBI/IC3 warning to travelers about a threat involving hotel Internet service overseas last week it produced a lot of requests for advice on how to respond to the threat. So a few of us researchers at ESET came up with a list of data security tips for travelers. These tips will help you keep your data safe while travelling in general, and defeat this particular threat (IC3 says a pop-up appears as you are signing in to the hotel Internet and asks you to update perform a software which is actually a malware infection).Below the list are some additional strategies and one example of what not to do with your laptop and your car, wherever you happen to be driving.

May 9, 2012 | San Diego, CA

Foreign Travel Malware Threat Alert: Watch out for hotel Internet connections

We received a worrying notice today from the Internet Crime Complaint Center (IC3) which is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), The headline reads: "Malware Installed on Travelers' Laptops Through Software Updates on Hotel Internet Connections." We felt that the warning which followed the headline was serious enough to relay it promptly to our readers in its entirety:Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while establishing an Internet connection in their hotel rooms.Recently, there have been instances of travelers' laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to setup the hotel room Internet connection and was presented with a pop-up window notifying the user to update a widely-used software product.

April 15, 2012 | San Diego, CA

How to recognize a PC support scam

A while ago, I responded to a blog comment promising some thoughts on how to recognize a cold-calling PC support scam. Unfortunately, I wasn't able to do that immediately, and then I was on vacation with no Internet connectivity (I should do that more often!). But then, since the problem isn't going to disappear any time soon, I guess advice on how to recognize it before you hand over any cash isn't going to pass its best-by date too soon, either.If you have caller-ID enabled on your phone display, you may see International or Number Withheld.

| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 |