Cryptojacking set to grow in 2019: EsetCases of cryptocurrency mining and cryptojacking will continue to grow in 2019, as attackers target smart devices and home assistants to build cryptomining farms, according to Eset’s latest trends report. Along with c More… |
Cryptojacking set to grow in 2019: EsetCases of cryptocurrency mining and cryptojacking will continue to grow in 2019, as attackers target smart devices and home assistants to build cryptomining farms, according to Eset’s latest trends report. Along with c More… |
Employees’ cybersecurity habits worsen: studyThe prevalence of cybersecurity incidents and the concomitant growing concerns about any organization’s cybersecurity posture haven’t done much to discourage many employees from engaging in poor security habits, a survey has found. More… |
Skills gap meets expanding threat surfaceIf you are concerned about the privacy and security of your information you might have noticed recent headlines declaring that the global cybersecurity job skills gap has grown to three million. This very worrying assertion – that many org More… |
Eset uncovers new espionage cyber threatEset, a top IT security software company, has uncovered a new cyber threat focuses on espionage and reconnaissance, quite possibly in preparation for future cybersabotage attacks. Named GreyEnergy by Eset, this threat actor is a s More… |
Eset uncovers new espionage cyber threatEset, a top IT security software company, has uncovered a new cyber threat focuses on espionage and reconnaissance, quite possibly in preparation for future cybersabotage attacks. Named GreyEnergy by Eset, this threat actor is a s More… |
Top tips for protecting your Smart TVThe final stretch of 2018 approaches. For parents of young children, this means that lunch boxes and homework are back. It is also the season, for many of us, when trees start to change colour before the arrival of the cold season. It is also th More… |
Could home appliances knock down power grids?Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to large-scale blackouts, according to a study from a tea More… |
Software bugs put health records at risk of exposureA team of seven researchers has discovered more than 20 security vulnerabilities in OpenEMR, an open-source application used worldwide for the electronic management of the medical records of almost 100 million people. In keeping w More… |
Eset launches new enterprise security solutionsEset, a leader in cybersecurity research, has launched a new line of enterprise security solutions designed to provide the global enterprise sector with tools for prevention and management of cyber risks on a global scale. Eset is More… |