Latest Articles

US: Your AI has to explain its decisions

US: Your AI has to explain its decisions

US: Your AI has to explain its decisions

No more turning a blind eye to algorithmic bias and discrimination if US lawmakers get their way

Cameron Camp08 Feb 2022


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

What to know before scanning a QR code – Has your phone been hacked? – Watch your back and keep shoulder surfers at bay

Editor04 Feb 2022


Think before you scan: How fraudsters can exploit QR codes to steal your money

Think before you scan: How fraudsters can exploit QR codes to steal your money

Think before you scan: How fraudsters can exploit QR codes to steal your money

QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares.

Tomáš Foltýn04 Feb 2022


Shoulder surfing: Watch out for eagle-eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle-eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle-eyed snoopers peeking at your phone

Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them

Phil Muncaster02 Feb 2022


How to tell if your phone has been hacked

How to tell if your phone has been hacked

How to tell if your phone has been hacked

Think your smartphone has been compromised by malware? Here's how to spot the signs of a hacked phone and how to remove the hacker from your phone.

Amer Owaida31 Jan 2022


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET Research uncovers DazzleSpy malware attacks targeting macOS users – Trading personal data for free online services – PayPal hacking made easy

Editor28 Jan 2022


Beyond the tick box: What to consider before agreeing to a privacy policy

Beyond the tick box: What to consider before agreeing to a privacy policy

Beyond the tick box: What to consider before agreeing to a privacy policy

The trade-off between using a free service and giving up our personal data becomes much less palatable when we think about the wider ramifications of the collection and use of our personal data

Tony Anscombe27 Jan 2022


Every breath you take, every move you make: Do fitness trackers pose privacy risks?

Every breath you take, every move you make: Do fitness trackers pose privacy risks?

Every breath you take, every move you make: Do fitness trackers pose privacy risks?

Should you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.

Phil Muncaster26 Jan 2022


Watering hole deploys new macOS malware, DazzleSpy, in Asia

Watering hole deploys new macOS malware, DazzleSpy, in Asia

Watering hole deploys new macOS malware, DazzleSpy, in Asia

Hong Kong pro-democracy radio station website compromised to serve a Safari exploit that installed cyberespionage malware on site visitors’ Macs

Marc-Etienne M.Léveillé and Anton Cherepanov25 Jan 2022


How I hacked my friend’s PayPal account

How I hacked my friend’s PayPal account

How I hacked my friend’s PayPal account

Somebody could easily take control of your PayPal account and steal money from you if you’re not careful – here's how to stay safe from a simple but effective attack

Jake Moore24 Jan 2022


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET research into Donot Team attacks – Common signs that your email has been hacked – Social media dos and don'ts in the workplace

Editor21 Jan 2022


How to know if your email has been hacked

How to know if your email has been hacked

How to know if your email has been hacked

Think your email may have been hacked? Here are the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again

Phil Muncaster20 Jan 2022


Apt Activity Report
MDR Protection