When it comes to protecting your children online, knowledge of risks is vital. With this in mind, ESET asked Australian parents about their main concerns.
ESET has recently observed a huge increase in detections of the Nemucod trojan, a threat that usually tries to download another malware from the internet. Those detections ratios were very high in some countries.
Many people are unaware of what measures they can take to identify malicious activity on their smartphone. We look at how at the key signs to be aware of.
Europol have been working alongside a number of European law enforcement authorities in an attempt to crackdown against the use of Remote Access Trojans.
A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers’ sites offline, after receiving threats about an imminent internet attack.
You might already have mince pies on the mind as we countdown to Christmas, but cybercrime doesn’t sleep and neither should your security solutions. Here is this week’s security review – our recap of the biggest, most interesting stories and opinions from the past seven days.
A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.
The UK’s Science and Technology Committee has heard that it is possible for the government to remotely access and use smart toys to spy on suspects.
Tech support scams are “still big business”, ESET’s David Harley has previously said. In this guide we look at how fraudsters dupe their victims into handing over cash, while also corrupting their devices.
MEPs in the European Parliament have agreed on the need for EU-wide cybersecurity legislation, which will establish a common framework for all member states to subscribe to.
At home, on the move, on a computer or via a mobile, online shopping habits have changed massively as technology as become more powerful. With Christmas around the corner, we look at some of the key details.