ESET researchers uncover a new campaign of the Winnti Group targeting universities and using ShadowPad and Winnti malware
A fix is available, so you may want to make sure that you run the plugin’s latest version
As Facebook turns 16, we look at how to keep your personal information safe from prying eyes
As software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice.
Have you had a Google Privacy Checkup lately? If not, when better than Data Privacy Day to audit the privacy of your Google account?
As the tide of phishing attacks rises, improving your scam-spotting skills is never a bad idea
Google releases a fix for the security hole that, if left unplugged, could allow attackers to run malicious code with no user interaction
You may want to implement a workaround or stop using the browser altogether, at least until Microsoft issues a fix
A subscription to the trove of personal details could be had for as little as $2
Footage defined as parody or satire will be permitted, as the social network isn’t slamming the door on all types of manipulated media
What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental in uncovering a number of malware strains hitting Linux servers.
February may be the shortest month of the year, but it brings a bumper crop of patches
Some of the most popular dating services may be violating GDPR or other privacy laws
The company will also soon launch anti-fingerprinting measures aimed at detecting and mitigating covert tracking and workarounds
The US cybersecurity agency warns that the critical vulnerability could allow attackers to take control of people's computers
Other leaked records include videos, facial and body scans, as well as a range of patients' personal data
The dawn of the DNS over HTTPS era is putting business security and SOC teams to the challenge
In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices
When it comes to protection against this insidious type of scam, the telcos’ authentication procedures leave a lot be desired, a study finds