Here’s a list of the 10 tools every white hat hacker needs in their toolkit, says ESET's Lucas Paus.
Archives - October 2016
It seems the current DDoS tactics from cybercriminals is to gain control over millions of IoT devices and direct their power towards any target they choose.
The personal details of 550,000 Australian Red Cross blood donors have been leaked in an event being described as Australia’s largest ever security breach.
As the world celebrates International Internet Day, we take a look at how cybercriminal activity has evolved online.
At least 50 celebrity Apple iCloud accounts and 72 Gmail inboxes were broken into by 36-year old Ryan Collins, whose victims included Jennifer Lawrence, Kirsten Dunst, Avril Lavigne, Kate Hudson, and Rihanna.
Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.
Who would have thought that webcams could be exploited? Well, they can, and so serious is the issue, that it has the likes of Mark Zuckerberg covering them with up with tape.
IoT devices, while extremely useful for simplifying various mundane aspects of everyday life, also offer criminals a new attack platform: your appliances.
ESET's threat analysts have taken a closer look at the software used by Sednit to spy on its targets and steal confidential information.
Chinese firm says it will recall vulnerable components, but as long as insecure devices continue to be attached to the internet, there will be opportunities for malicious hackers to exploit them and use them for their own ends.
On Friday October 21st, a series of IoT DDoS attacks caused widespread disruption of legitimate internet activity in the US. Stephen Cobb investigates.
European Cyber Security Month offers a great opportunity to remind people of some of the practices that can boost their cybersecurity skills.
Criminals are hunting for routers with default credentials and with vulnerabilities in their firmware, with Brazilians the main target.
A Facebook hoax that has been around since at least 2012 has resurfaced, claiming that private photographs and messages are going to be made public.
Security researchers at ESET have released their latest research into the notorious and highly experienced Sednit cyberespionage group.
Need some more help choosing an inane conversation topic with your online friends? Don't panic! Facebook appears keen to help you. But is its behaviour bordering on creepy?
Tests show that software vulnerabilities and weak passwords are common in home routers, with up to 15% of them being unsecured.
Consumers are failing to appropriately protect themselves against the threat of cybercrime, according to a new survey from Get Safe Online.
A culture of cybersecurity is essential in today’s organizations to help ensure that they are able to successfully fend off cyberattacks.
Demand for information security specialists is growing, and there are many routes to qualification. Do you have the skills to transform cybersecurity?