ESET Research Podcast: Neanderthals, Mammoths and Telekopye
ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces
ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes
Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?
ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past?
ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past?
ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past?
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.
ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play
Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk
While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them
AI-driven voice cloning can make things far too easy for scammers – I know because I’ve tested it so that you don’t have to learn about the risks the hard way.
An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause
An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause
An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause
How much contact and personal information do you give away in your LinkedIn profile and who can see it? Here’s why less may be more.
Through engaging hacking challenges and competitions, CTFs offer an excellent opportunity to test and enhance your security and problem-solving skills
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk
ESET researchers discovered Kamran, previously unknown malware, which spies on Urdu-speaking readers of Hunza News
How ESET Research found a kill switch that had been used to take down one of the most prolific botnets out there
Global Diversity Awareness Month is a timely occasion to reflect on the steps required to remove obstacles to women’s participation in the security industry and to consider the value of diversity in the security workforce
Global Diversity Awareness Month is a timely occasion to reflect on the steps required to remove obstacles to women’s participation in the security industry and to consider the value of diversity in the security workforce
Global Diversity Awareness Month is a timely occasion to reflect on the steps required to remove obstacles to women’s participation in the security industry and to consider the value of diversity in the security workforce
Cybersecurity Awareness Month draws to a close and Halloween is just around the corner, so here is a bunch of spine-tingling figures about some very real tricks and threats lurking online
The zero-day exploit deployed by the Winter Vivern APT group only requires that the target views a specially crafted message in a web browser
Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. What’s the trade-off?
Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. What’s the trade-off?
How robust backup practices can help drive resilience and improve cyber-hygiene in your company
How robust backup practices can help drive resilience and improve cyber-hygiene in your company
Why keeping software up to date is a crucial security practice that should be followed by everyone from individual users to SMBs and large enterprises
4909 Murphy Canyon Road Suite, 500
San Diego, CA 92123
Store
Company
Support
Newsletter
Technology Solutions You Can Trust Dismiss