Smart Home Automation


ESET unveils improvements to security for home users

1 October 2019 Smart Home Automation Information Security Products & Solutions

The latest versions of ESET NOD32 Antivirus, ESET Internet Security and ESET Smart Security Premium, offering multiplatform integration, advanced machine learning, an improved password manager and secure data encryption, has been released.

“The surging numbers of Internet-connected devices present a tantalising opportunity for hackers to exploit. Home users are at risk of falling victim to cybercrime without security products that can consistently confront hackers’ attempts at every level. That’s what ESET aims to do with this new edition of our home security products – to give home users the peace of mind knowing that over 30 years of security intelligence is at work actively protecting their devices against the hackers of today,” says Carey van Vlaanderen, CEO at ESET South Africa.

In addition to protection, ESET’s home solutions have also demonstrated results in terms of low system footprint and high performance. AV-Comparatives has awarded ESET Internet Security with five consecutive Advanced+ awards for high performance since May 2017.

The latest edition of ESET’s offering for home users includes a host of new features and improvements:

New multiplatform compatibility – ESET Internet Security (EIS), ESET Smart Security Premium (ESSP), and ESET Cyber Security Pro (ECSP) product licences are now compatible across platforms. So, customers who purchase a licence for EIS, ESSP, or ECSP can now use the same licence to protect their other Windows, Mac, Linux, and Android devices with solutions such as ESET Mobile Security for Android, ESET Parental Control for Android and ESET Smart TV Security.

New advanced machine learning layer – Machine learning employs a wide variety of algorithms to correctly classify samples as clean, malicious or potentially unwanted. Thus, by adding a machine learning layer to home solutions, users are better protected against never-before-seen or zero-day cyber threats.

Improved Host-based Intrusion Prevention System (HIPS) – HIPS conducts an advanced behavioural analysis and detection procedure of running processes, files and registry keys. The current improvement further strengthens the existing detection capabilities of HIPS.

Improved anti-phishing – Anti-phishing technology protects end-users from malicious emails, links, and attachments. The current improvement provides protection against homoglyph attacks where the attacker tries to fool end users by replacing characters in addresses with lookalike characters in order to impersonate legitimate addresses.

Improved banking and payment protection – Financial portals and transactions online require extra protection from prying eyes. Now there is a predefined list of websites that will trigger a secure ‘banking’ browser to open. The list contains not only bank sites, but also PayPal, Apple, and online-based crypto wallets. In addition, trusted media sites are also protected, which prevents fake news from gaining undeserved coverage.

Improved Connected Home Monitor (CHM) – Home users can use CHM to scan their home Internet router for vulnerabilities such as weak passwords, port vulnerabilities, known firmware vulnerabilities, malicious domains, malware infections, etc. CHM will provide improved user guidance for any detected issues. CHM can also discover all devices connected to your home Wi-Fi network – now with improved device recognition including IP address, MAC address, device name, model, and vendor details.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...
Save energy with Paxton’s Net2 Access Control
Paxton Power Management Products & Solutions
Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but, importantly, helps save businesses money.

Read more...