Latest Articles

5 warning signs your identity has been stolen

5 warning signs your identity has been stolen

5 warning signs your identity has been stolen

By spotting these early warning signs of identity theft, you can minimize the impact on you and your family

Phil Muncaster14 Dec 2021


Log4Shell vulnerability: What we know so far

Log4Shell vulnerability: What we know so far

Log4Shell vulnerability: What we know so far

The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far

Rene Holt13 Dec 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

How 'shoulder surfers' could hack into your Snapchat – Staying safe from gift card fraud – What is a buffer overflow vulnerability?

Editor10 Dec 2021


SnapHack: Watch out for those who can hack into anyone’s Snapchat!

SnapHack: Watch out for those who can hack into anyone’s Snapchat!

SnapHack: Watch out for those who can hack into anyone’s Snapchat!

Oh snap! This is how easy it may be for somebody to hijack your Snapchat account – all they need to do is peer over your shoulder.

Jake Moore09 Dec 2021


5 common gift card scams and how to spot them

5 common gift card scams and how to spot them

5 common gift card scams and how to spot them

It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season

Phil Muncaster07 Dec 2021


What are buffer overflow attacks and how are they thwarted?

What are buffer overflow attacks and how are they thwarted?

What are buffer overflow attacks and how are they thwarted?

Ever since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities

Rene Holt06 Dec 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET researchers analyze malware frameworks targeting air-gapped networks – ESET Research launches a podcast – INTERPOL cracks down on online fraud

Editor03 Dec 2021


Scammers exploit Omicron fears in new COVID-19 phishing campaign

Scammers exploit Omicron fears in new COVID-19 phishing campaign

Scammers exploit Omicron fears in new COVID-19 phishing campaign

Fraudsters take advantage of the emergence of the new variant to dupe unsuspecting victims out of their sensitive data

Amer Owaida03 Dec 2021


Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

Launching ESET Research Podcast: A peek behind the scenes of ESET discoveries

Press play for the first episode as host Aryeh Goretsky is joined by Zuzana Hromcová to discuss native IIS malware

Roman Kováč02 Dec 2021


Jumping the air gap: 15 years of nation-state effort

Jumping the air gap: 15 years of nation-state effort

Jumping the air gap: 15 years of nation-state effort

ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs

Alexis Dorais-Joncas and Facundo Muñoz01 Dec 2021


More than 1,000 arrested in global crackdown on online fraud

More than 1,000 arrested in global crackdown on online fraud

More than 1,000 arrested in global crackdown on online fraud

The INTERPOL-led operation involved law enforcement from 20 countries and led to the seizure of millions of dollars in illicit gains

Amer Owaida29 Nov 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice

Editor26 Nov 2021


Apt Activity Report
MDR Protection