On the implications of facial recognition for privacy and security – Data privacy tips for businesses – Red flags for cyberbullying. All this in Week in security.
What are some of the most common warning signs that your child is experiencing online harassment?
Google keeps pushing in its mission for broader encryption adoption
What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable?
IM-RAT, which could be had for as little as US$25, was bought by nearly 15,000 people
Smart selections when starting small can ease the pain as you scale up your company’s privacy infrastructure
ESET researchers detail how the operators of the Stantinko botnet have expanded their toolset with a new means of profiting from computers under their control
A device that is supposed to help parents keep track of their children and give them a peace of mind can be turned into a surveillance device
Black Friday and Cyber Monday are just around the corner and scammers are gearing up to flood you with bogus offers
UPbit has announced that, as a precaution, all transactions will remain suspended for at least two weeks
ESET researchers have discovered that the criminals behind the Stantinko botnet are distributing a cryptomining module to the computers they control
How the field of play has changed and why endpoint protection still often comes down to doing the basics, even in the face of increasingly complex threats
ESET researchers publish their findings on Mispadu, a banking trojan targeting Brazil and Mexico, and on DePriMon, a downloader with a unique installation technique
Experts weigh in on whether schools should teach kids the skills they need to safely reap the benefits of the online world
ESET researchers have discovered a new downloader with a novel, not previously seen in the wild installation technique
From professional backgrounds to competitive salaries – a study delves into what it takes to build strong cybersecurity teams
Another in our occasional series demystifying Latin American banking trojans
As users are losing access to their accounts by the dozens, we offer a few tips to help keep your streaming subscriptions safe
ESET experts share how they got started in cybersecurity and whether or not a degree is needed for a career in the industry
The critical vulnerability could also be exploited via a malicious Microsoft Office document