More than 1,000 arrested in global crackdown on online fraud
The INTERPOL-led operation involved law enforcement from 20 countries and led to the seizure of millions of dollars in illicit gains
The INTERPOL-led operation involved law enforcement from 20 countries and led to the seizure of millions of dollars in illicit gains
‘Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products
With the holiday shopping bonanza right around the corner, here's how to make sure your online spending spree is safe
Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends
Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed
Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks.
US Government declassifies cybersecurity subjects they want you to learn about, and is hoping to pay you to learn them
A victim of identity theft tells us how criminals used his identity to commit fraud and what it took to put his life back in order
ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high‑profile websites in the Middle East
Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks
It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a breach
The tech giant wins an appeal against a claim that it unlawfully collected personal data of millions of iPhone users
An attacker gained access to some of Robinhood's customer support systems and stole the personal data of a third of the app's userbase
Are the days numbered for ‘123456’? As Microsoft further nudges the world away from passwords, here’s what your organization should consider before going password-free.
Beyond the vulnerability in the Android kernel, the monthly round of security patches plugs another 38 security loopholes
Security and privacy get a leg up in Proton’s legal challenge against data retention and disclosure obligations
Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field
On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000