Don't panic. Facebook and Netflix have not suffered a data breach. But it's quite possible that they are asking you to change your password.
With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.
An ELOFANT is an "Employee Left Or Fired, Access Not Terminated" and these ghost account insiders can undermine your organization's information security, as recent DBIR stats suggest.
65 million Tumblr users have had their details compromised as a result of a recently-discovered breach dating back to 2013. But it's not just their passwords that they should be concerned about.
An 18-year-old man has been charged by British police in connection with an internet attack that saw Mumsnet hacked, users' accounts breached, passwords stolen, and the site blasted offline.
If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or left unchanged, then ESET has good news for you.
After BlackEnergy and Operation Potao Express, ESET researchers have uncovered another cyberespionage operation in Ukraine: Operation Groundbait.
US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.
A report from the Institute for Critical Infrastructure Technology warns that ransomware could be hitting more than just your regular computer in future...
You would be wrong to think that this is just an attempt by the criminals to steal your Apple ID password - bad as that would be. It's much worse than that.
One year after the release of the technical analysis of the Mumblehard Linux botnet, it is no longer active. ESET, in collaboration with the Cyber Police of Ukraine and CyS Centrum LLC, have taken down the botnet, stopping its spamming activities.
David Harley, a senior research fellow at ESET, offers expert answers to six important questions that concern vulnerabilities, exploits and patches.
In recent months, there has been a significant increase in the number of networks and users affected by ransomware known as Locky, discusses ESET's Diego Perez.
More than 30 photos of the celebrities have been posted on Twitter by a hacker who appears to have stolen the pictures from the iCloud account of Styles's mother, Anne.
If you fail to take proper care, it would be all too easy to type your password into a phishing site and hand control of your website over to a online criminal gang.
Even though the US is among the most technologically advanced nations in the world, most of its voters cannot cast their ballots online. Is internet voting a risk? Ondrej Kubovič reports.
ESET's Pablo Ramos takes a closer a look at the most common threats facing companies today and the impact that they can have.
Research shows that the average age of cybercrime suspects last year was just 17 years-old. We Live Security asks why, and suggests how you can protect your child.
A unique survey among threat experts has revealed that most cyberattacks against a typical IT infrastructure take less than 24 hours to plan and execute, and almost half are successful.
Two major cyberattacks have siphoned over $50 million and nearly $80 million from a Belgian bank and an Austrian aircraft parts manufacturer, respectively. They were both victim to a scam known as Business Email Compromise.