The latest episode of this series marks the halfway point in the third season and, in addition to some amazing camerawork there are several examples of actions related to IT security that crop up throughout the episode.
Search results for: "mr. robot"
Since nothing is what is seems, it's hard to be sure who was really behind the attacks shown in the series. The world still believes fsociety was responsible (and they themselves do too, to an extent), but the truth is that there is a group in the shadows that is pulling all the strings.
Cybersecurity and hacking play a leading role in the series, so with Mr. Robot season 02 almost over, we want to do a reality check on the scenarios we saw.
At Comic-Con 2016, ESET's Anna Keeve dives deep into the "real" world of Mr. Robot, has a VR adventure, and looks for cybersecurity clues in Elliot's room.
One of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET's Josep Albors.
Using smartphones at a bank might seem like the most routine habit in the world but sometimes these smartphones are being used as way to gain access to the bank's WiFi and sensitive data.
ESET has discovered a Linux variant of the KillDisk component that renders Linux machines unbootable, while encrypting files and requesting a large ransom at the same time.
ESET's Anton Cherepanov analyzes the work of TeleBots, a malicious toolset that was used in focused cyberattacks against targets in Ukraine's financial sector.
Here’s a list of the 10 tools every white hat hacker needs in their toolkit, says ESET's Lucas Paus.
Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.
USBee is a form of "air gap attack". It uses a USB device to transmit the information the attacker wants to steal at frequencies between 240 and 480Mhz.
This blogpost reveals many details about the Diskcoder.C (aka ExPetr or NotPetya) outbreak and related information about previously unpublished attacks.