Latest Articles

Digital Security

Everything you need to know about IP grabbers

Everything you need to know about IP grabbers

Digital Security

Everything you need to know about IP grabbers

You would never give your personal ID to random strangers, right? So why provide the ID of your computer? Unsuspecting users beware, IP grabbers do not ask for your permission.

Márk Szabó22 Feb 2024


ESET Research, Ukraine Crisis – Digital Security Resource Center

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

ESET Research, Ukraine Crisis – Digital Security Resource Center

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

A mix of PSYOPs, espionage and … fake Canadian pharmacies!

Matthieu Faou21 Feb 2024


How To

Watching out for the fakes: How to spot online disinformation

Watching out for the fakes: How to spot online disinformation

How To

Watching out for the fakes: How to spot online disinformation

Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes?

Márk Szabó20 Feb 2024


Video

Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe

Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe

Video

Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe

Here's how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals

Editor16 Feb 2024


Video

What is AI, really? | Unlocked 403: A cybersecurity podcast

What is AI, really? | Unlocked 403: A cybersecurity podcast

Video

What is AI, really? | Unlocked 403: A cybersecurity podcast

Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack AI's basics, applications and broader implications.

Alžbeta Kovaľová15 Feb 2024


Cybercrime

The art of digital sleuthing: How digital forensics unlocks the truth

The art of digital sleuthing: How digital forensics unlocks the truth

Cybercrime

The art of digital sleuthing: How digital forensics unlocks the truth

Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell

Lucas Paus and Mario Micucci14 Feb 2024


Digital Security

Deepfakes in the global election year of 2024: A weapon of mass deception?

Deepfakes in the global election year of 2024: A weapon of mass deception?

Digital Security

Deepfakes in the global election year of 2024: A weapon of mass deception?

As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern

Phil Muncaster13 Feb 2024


Video, Ransomware

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Video, Ransomware

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Called a "watershed year for ransomware", 2023 marked a reversal from the decline in ransomware payments observed in the previous year

Editor09 Feb 2024


Business Security

The buck stops here: Why the stakes are high for CISOs

The buck stops here: Why the stakes are high for CISOs

Business Security

The buck stops here: Why the stakes are high for CISOs

Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?

Phil Muncaster08 Feb 2024


Business Security

Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

Business Security

Left to their own devices: Security for employees using personal devices for work

As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it

Christian Ali Bravo06 Feb 2024


Scams

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

Scams

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

With Valentine’s Day almost upon us, here’s some timely advice on how to prevent scammers from stealing more than your heart

Imogen Byers05 Feb 2024


Video

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Video

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows

Editor02 Feb 2024