
Latest Articles
Instagram’s new age verification tool – Week in security with Tony Anscombe
As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?
Virtual private networks: 5 common questions about VPNs answered
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
Phishing awareness training: Help your employees avoid the hook
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
Crypto mixers: What are they and how are they used?
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
How to spot malicious spam – Week in security with Tony Anscombe
As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
Industroyer: A cyber‑weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe
Here are three themes that stood out at the world's largest gathering of cybersecurity professionals
RSA – APIs, your organization’s dedicated backdoors
API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly
RSA – Creepy real‑world edition
Digital fiddling somehow got mixed up in a real war
RSA – Digital healthcare meets security, but does it really want to?
Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission
RSA – Spot the real fake
How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
Cybersecurity awareness training: What is it and what works best?
Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe
A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses
100 days of war in Ukraine: How the conflict is playing out in cyberspace
It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict
ESET Threat Report T 1 2022
A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Talking to children about the internet: A kid’s perspective
A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet
Keeping it real: Don’t fall for lies about the war
Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what’s in the fake news
Scams targeting NFT investors – Week in security with Tony Anscombe
As with everything digital, there's someone, somewhere devising a method to steal the assets away from their rightful owners
Cybersecurity: A global problem that requires a global answer
New and exacerbated cyber-risks following Russia’s invasion of Ukraine are fueling a new urgency towards enhancing resilience