Hackers could force locked iPhones to make contactless payments
Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds
Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds
A view of the T2 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks
The emergency release comes a mere three days after Google’s previous update that plugged another 19 security loopholes
While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented
Yet another APT group that exploited the ProxyLogon vulnerability in March 2021
Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.
The group used phishing, BEC and other types of attacks to swindle victims out of millions
The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.
The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML.
The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks.
Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.
From cybercriminal evergreens like phishing to the verification badge scam, we look at the most common tactics fraudsters use to trick their victims
Elderly men and women were the main targets of the romance scams operated by the fraudsters.
The university suffered a ransomware attack; however, there is no evidence so far of data being accessed or stolen.
Following the incident the company has updated its website and privacy policy to clarify its legal obligations to users
ESET researchers have investigated a mobile espionage campaign that targets the Kurdish ethnic group and has been active since at least March 2020
Smartphones are kids’ trusty companions both in- and outside the classroom, and as they return to their desks, we’ve prepared some handy tips on how to keep their devices secure.
Dubbed Safety Mode, the feature will temporarily block authors of offensive tweets from being able to contact or follow users.