Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Digital Security
Hacking space: How to pwn a satellite
Hacking an orbiting satellite is not light years away – here’s how things can go wrong in outer space
Cameron Camp • 07 Jun 2021
Video
Week in security with Tony Anscombe
New ESET Threat Report is out – How to deal with online trolls – Teens, beware these 5 common scams
Editor • 04 Jun 2021
Zero-day in popular WordPress plugin exploited to take over websites
Websites using Fancy Product Designer are susceptible to remote code execution attacks even if the plugin is deactivated
Amer Owaida • 03 Jun 2021
Threat Reports, ESET Research
ESET Threat Report T1 2021
A view of the T1 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Roman Kováč • 03 Jun 2021
Kids Online
5 common scams targeting teens – and how to stay safe
From knock-off designer products to too-good-to-be-true job offers, here are five common schemes fraudsters use to trick teenagers out of their money and sensitive data
Amer Owaida • 01 Jun 2021
How To
Don’t feed the trolls and other tips for avoiding online drama
You may not be able to escape internet trolls, but you have a choice about how you will deal with them – here’s how you can handle trolls without losing your cool
Amer Owaida • 31 May 2021
You, too, may be vulnerable to SIM swap attacks – How to defend yourself against rom-cons – Zero day in macOS allowed malware to take secret screenshots
Editor • 28 May 2021
Scams
I hacked my friend’s website after a SIM swap attack
Here’s how easily your phone number could be stolen, why a successful SIM swap scam is only the beginning of your problems, and how you can avoid becoming a victim of the attack
Jake Moore • 27 May 2021
Bluetooth bugs could allow attackers to impersonate devices
Patches to remedy the vulnerabilities should be released over the coming weeks
Amer Owaida • 26 May 2021
Apple fixes macOS zero-day bug that let malware take secret screenshots
You would do well to update to macOS Big Sur 11.4 post-haste
Amer Owaida • 25 May 2021
Rom-con: How romance fraud targets older people – and how to stay safe
Online dating scams often follow the same script – here’s what senior citizens should watch out for and how their younger relatives can help them avoid falling victim
Amer Owaida • 24 May 2021
How stalkerware puts the stalkers' own data at risk – Watch out for FluBot – Building security into critical infrastructure
Editor • 21 May 2021
OceanLotus: New watering hole attack in Southeast Asia
Malware
Banking Trojans continue to surface on Google Play
A short history of the computer password
How do you know if your smartphone has been compromised?
Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan
Sign up for our newsletters