Latest Articles

Scams, Business Security

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

Scams, Business Security

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.

Raj Kapoor02 Aug 2023


Digital Security, We Live Progress, Privacy

Quantum computing: Will it break crypto security within a few years?

Quantum computing: Will it break crypto security within a few years?

Digital Security, We Live Progress, Privacy

Quantum computing: Will it break crypto security within a few years?

Current cryptographic security methods watch out - quantum computing is coming for your lunch.

Cameron Camp01 Aug 2023


Video

Is backdoor access oppressive? – Week in security with Tony Anscombe

Is backdoor access oppressive? – Week in security with Tony Anscombe

Video

Is backdoor access oppressive? – Week in security with Tony Anscombe

Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?

Editor28 Jul 2023


Internet of Things, Digital Security, Privacy

Gathering dust and data: How robotic vacuums can spy on you

Gathering dust and data: How robotic vacuums can spy on you

Internet of Things, Digital Security, Privacy

Gathering dust and data: How robotic vacuums can spy on you

Mitigate the risk of data leaks with a careful review of the product and the proper settings.

Roman Cuprik26 Jul 2023


Scams

Dear all, What are some common subject lines in phishing emails?

Dear all, What are some common subject lines in phishing emails?

Scams

Dear all, What are some common subject lines in phishing emails?

Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.

Roman Cuprik25 Jul 2023


Video

What happens if AI is wrong? – Week in security with Tony Anscombe

What happens if AI is wrong? – Week in security with Tony Anscombe

Video

What happens if AI is wrong? – Week in security with Tony Anscombe

Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?

Editor21 Jul 2023


Scams

8 common work-from-home scams to avoid

8 common work-from-home scams to avoid

Scams

8 common work-from-home scams to avoid

That ‘employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities

Phil Muncaster20 Jul 2023


Kids Online

Child identity theft: How do I keep my kids’ personal data safe?

Child identity theft: How do I keep my kids’ personal data safe?

Kids Online

Child identity theft: How do I keep my kids’ personal data safe?

Why is kids’ personal information in high demand, how do criminals steal it, and what can parents do to help prevent child identity theft?

Phil Muncaster19 Jul 2023


Scams

Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour

Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour

Scams

Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour

There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud

Tony Anscombe18 Jul 2023


Video

Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe

Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe

Video

Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe

Here's how cybercriminals have adjusted their tactics in response to Microsoft's stricter security policies, plus other interesting findings from ESET's new Threat Report

Editor14 Jul 2023


Business Security

The danger within: 5 steps you can take to combat insider threats

The danger within: 5 steps you can take to combat insider threats

Business Security

The danger within: 5 steps you can take to combat insider threats

Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?

Márk Szabó13 Jul 2023


ESET Research

ESET Research Podcast: Finding the mythical BlackLotus bootkit

ESET Research Podcast: Finding the mythical BlackLotus bootkit

ESET Research

ESET Research Podcast: Finding the mythical BlackLotus bootkit

Here's a story of how an analysis of a supposed game cheat turned into the discovery of a powerful UEFI threat

ESET Research12 Jul 2023


Apt Activity Report
MDR Protection