Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Internet of Things, Privacy
Every breath you take, every move you make: Do fitness trackers pose privacy risks?
Should you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.
Phil Muncaster • 26 Jan 2022
Watering hole deploys new macOS malware, DazzleSpy, in Asia
Hong Kong pro-democracy radio station website compromised to serve a Safari exploit that installed cyberespionage malware on site visitors’ Macs
Marc-Etienne M.Léveillé and Anton Cherepanov • 25 Jan 2022
How To
How I hacked my friend’s PayPal account
Somebody could easily take control of your PayPal account and steal money from you if you’re not careful – here's how to stay safe from a simple but effective attack
Jake Moore • 24 Jan 2022
Video
Week in security with Tony Anscombe
ESET research into Donot Team attacks – Common signs that your email has been hacked – Social media dos and don'ts in the workplace
Editor • 21 Jan 2022
How to know if your email has been hacked
Think your email may have been hacked? Here are the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again
Phil Muncaster • 20 Jan 2022
DoNot Go! Do not respawn!
ESET researchers take a deep look into recent attacks carried out by Donot Team throughout 2020 and 2021, targeting government and military entities in several South Asian countries
Facundo Muñoz and Matías Porolli • 18 Jan 2022
Social Media
Social media in the workplace: Cybersecurity dos and don'ts for employees
Do you often take to social media to broadcast details about your job, employer or coworkers? Think before you share – less may be more.
Amer Owaida • 17 Jan 2022
How malware exploits security flaws in kernel drivers – Watch out for cryptocurrency scams – Why loyalty accounts are a target for criminals
Editor • 14 Jan 2022
Scams
Making loyalty pay: How to keep your loyalty rewards safe from scammers
Is loyalty fraud on your radar? Here's why your hard-earned reward points and air miles may be easy pickings for cybercriminals.
Phil Muncaster • 13 Jan 2022
Crypto scams: What to know and how to protect yourself
As you attempt to strike it rich in the digital gold rush, make sure you know how to recognize various schemes that want to part you from your crypto
Phil Muncaster • 12 Jan 2022
Digital Security
CES 2022: Wireless power for all
We don’t need no stinkin’ wall power – CES shows off the promise of usable long-range wireless charging
Cameron Camp • 11 Jan 2022
Signed kernel drivers – Unguarded gateway to Windows’ core
ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation
Michal Poslušný • 11 Jan 2022
How To, Digital Security
How to get rid of your old devices safely
Router reboot: How to, why to, and what not to do
Cybercrime
BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry
Ransomware
Ransomware: To pay or not to pay? Legal or illegal? These are the questions …
Sign up for our newsletters