The legendary ESET NOD32 Antivirus has been specifically coined to provide proactive computer protection and internet security in terms of Smart Detection, Small System Footprint and Advanced Manageability


Award-winning ThreatSense technology uses multiple layers of threat detection to deliver the most effective protection possible against new attacks.


Want even more control over your phone and an extra level of protection to give you peace of mind? Stay connected without worry safeguarded by a raft of premium features. Enjoy surfing on the go and downloading apps while safeguarded by proven antivirus.


Yes, your Mac is a safe platform with a strong security record, but Mac viruses and other cyber attacks still pose an ongoing threat. ESET Cyber Security protects you from these threats so you can explore the web with confidence.


ESET is a pioneer in the Antivirus industry for over 25 years and has a long track record of high performance.Our unified scanning core supports a breadth of operating systems and platforms with products that have earned an array of awards and accolades.

Tuesday, September 9, 2014


 An internet-wide newsbreak regarding anonymous hackers who obtained explicit photos of various Hollywood celebrities, including many A-listers like Jennifer Lawrence, and then publicised this material on the Internet, made the headlines recently.

According to experts these leaks are not new; however, this particular incident was on a massive scale. From the very beginning there was an assumption that perhaps some photos were stolen directly from celebrities’ accounts in the Apple’s iCloud. Is this possible? If so, what can be done to avoid the theft?

To avoid possible issues with private data leaks via computers, mobile devices or cloud services, Security Researchers recommend the following measures;

1. Use strong passwords, unique to each account.

2. Use endpoint security solutions to protect your devices, because every device is a gateway to your cloud storage.

3. Enable and use two-factor authentication services whenever available.

4. Sort out which information should or should not be stored in the cloud. Your most sensitive information – whether relating to your personal or professional life – should never be trusted to the cloud.

5. It’s easy for a mobile device to be lost or stolen, so make sure the device itself has no sensitive data stored on it. If this is impossible, make sure there is appropriate encryption in place.

6. If you’re about to store highly sensitive information (including photos and videos), double check that your device doesn’t automatically upload data into the cloud.

7. Before sharing your personal data or allowing someone to take a picture of you, make sure that the other device is sufficiently secure to keep your private data safe from inadvertent exposure.
This alleged incident proves that privacy is increasingly fragile nowadays, for celebs as well as business operators. Although cloud-based file storage services have long been popular among Internet users, the indisputable convenience of such services is at least partly offset by some significant risks.


Twitter Delicious Facebook Linkedin Stumbleupon Favorites More