Award-winning news, views, and insight from the ESET security community
Lukas Stefanko and Peter Strýček • 23 Jul 2024 • 10 min. read
ESET Research
The tap-estry of threats targeting Hamster Kombat players
Lukas Stefanko • 22 Jul 2024 • 5 min. read
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
Romain Dumont • 18 Jul 2024 • 23 min. read
HotPage: Story of a signed, vulnerable, ad-injecting driver
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Scams, Business Security
The grand theft of Jake Moore’s voice: The concept of a virtual kidnap
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
Raj Kapoor • 02 Aug 2023
Digital Security, We Live Progress, Privacy
Quantum computing: Will it break crypto security within a few years?
Current cryptographic security methods watch out - quantum computing is coming for your lunch.
Cameron Camp • 01 Aug 2023
Video
Is backdoor access oppressive? – Week in security with Tony Anscombe
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?
Editor • 28 Jul 2023
Internet of Things, Digital Security, Privacy
Gathering dust and data: How robotic vacuums can spy on you
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
Roman Cuprik • 26 Jul 2023
Scams
Dear all, What are some common subject lines in phishing emails?
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.
Roman Cuprik • 25 Jul 2023
What happens if AI is wrong? – Week in security with Tony Anscombe
Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
Editor • 21 Jul 2023
8 common work-from-home scams to avoid
That ‘employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities
Phil Muncaster • 20 Jul 2023
Kids Online
Child identity theft: How do I keep my kids’ personal data safe?
Why is kids’ personal information in high demand, how do criminals steal it, and what can parents do to help prevent child identity theft?
Phil Muncaster • 19 Jul 2023
Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour
There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud
Tony Anscombe • 18 Jul 2023
Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe
Here's how cybercriminals have adjusted their tactics in response to Microsoft's stricter security policies, plus other interesting findings from ESET's new Threat Report
Editor • 14 Jul 2023
The danger within: 5 steps you can take to combat insider threats
Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?
Márk Szabó • 13 Jul 2023
ESET Research Podcast: Finding the mythical BlackLotus bootkit
Here's a story of how an analysis of a supposed game cheat turned into the discovery of a powerful UEFI threat
ESET Research • 12 Jul 2023
Sign up for our newsletters