A number of celebrities, government officials and tech CEOs were also caught up in the incident
The dawn of the DNS over HTTPS era is putting business security and SOC teams to the challenge
The same hackers have also gotten their mitts on social media accounts of other high-profile sporting targets
If you’re looking to become a pro gamer, there are risks you shouldn’t play down
The league and scores of teams were caught off-guard by the re-emergence of an infamous hacking group
Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection
And it doesn’t require much more than downloading a dedicated app
An ESET-commissioned survey sheds light on the browsing habits of Australians and how they protect themselves online
Today, Microsoft is officially pulling the plug on its support for Windows 7. What’s your plan?
As software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
No one has a road map for securing a connected city – but there should be a whole atlas of such maps
Footage defined as parody or satire will be permitted, as the social network isn’t slamming the door on all types of manipulated media
In the second blogpost of this two-part series we'll suggest handy tips to help enhance the security of your mobile devices
In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices
Disposing of old tech isn’t a one-click solution; there are multiple things you have to consider before moving on to greener pastures
What are some of the key things you should do with your shiny new device as soon as you unbox it?
The second authentication factor might be a minor inconvenience, but it provides a major security boost
With 2019 ending, ESET experts offer their insights into how new innovations will impact our privacy, security and lives in the not so distant future
Smart selections when starting small can ease the pain as you scale up your company’s privacy infrastructure
How the field of play has changed and why endpoint protection still often comes down to doing the basics, even in the face of increasingly complex threats