How @supports Works

Share this: CSS has a neat feature that allows us to test if the browser supports a particular property or property:value combination before applying a block of styles — like how a @media query matches when, say, the width of the browser window is narrower than some specified size and then the CSS within it […]

Read more
Privacy Ops: The New Nexus for CISOs & DPOs

No longer can privacy be an isolated function managed by legal or compliance departments with little or no connection to the organization’s underlying security technology. Recent advancements in machine learning and big data analytics have made data more important today than ever before. Companies are now investing heavily in protecting their customers’ data; for instance, […]

Read more
MWC 2019: Why 5G + Fortnite = a win-win for criminals

So apparently, the company behind Fortnite has so much cash that it’s forming a $100 million prize fund for upcoming competitions. It’s hardly surprising since its creators, Epic Games, confirmed that by the end of November 2018, 200 million players had registered accounts across PCs, gaming consoles and on mobile. The Android app alone was […]

Read more
A Deep Dive on the Recent Widespread DNS Hijacking Attacks

The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that […]

Read more
Smoke damage and hard drives

A closer look at the damage caused by smoke particles and some steps you can take to aid recovery As employees of ESET, we have many discussions on WeLiveSecurity revolving around malicious software and hardware threats, and the tools to counter them.  However, security is a much broader category than just that, and it includes […]

Read more
Top