Latest Articles

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

What's it like working as a malware researcher? – ProtonMail and the battle for email privacy – Man charged with hacking, trying to extort US sports leagues

Editor05 Nov 2021


Google squashes Android zero-day bug exploited in targeted attacks

Google squashes Android zero-day bug exploited in targeted attacks

Google squashes Android zero-day bug exploited in targeted attacks

Beyond the vulnerability in the Android kernel, the monthly round of security patches plugs another 38 security loopholes

Amer Owaida04 Nov 2021


Win one for privacy – Swiss providers don’t have to talk

Win one for privacy – Swiss providers don’t have to talk

Win one for privacy – Swiss providers don’t have to talk

Security and privacy get a leg up in Proton’s legal challenge against data retention and disclosure obligations

Cameron Camp03 Nov 2021


What's it like to work as a malware researcher? 10 questions answered

What's it like to work as a malware researcher? 10 questions answered

What's it like to work as a malware researcher? 10 questions answered

Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field

Editor03 Nov 2021


Man charged with hacking major US sports leagues to illegally stream games

Man charged with hacking major US sports leagues to illegally stream games

Man charged with hacking major US sports leagues to illegally stream games

On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000

Amer Owaida02 Nov 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR

Editor29 Oct 2021


5 tips for parents for a cybersecure Halloween

5 tips for parents for a cybersecure Halloween

5 tips for parents for a cybersecure Halloween

What are some of the key dangers faced by children online and how can you help protect them from the ghosts, ghouls and goblins creeping on the internet?

Amer Owaida28 Oct 2021


Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

The police sting spanned three continents and involved crackdowns in nine countries

Amer Owaida27 Oct 2021


Wslink: Unique and undocumented malicious loader that runs as a server

Wslink: Unique and undocumented malicious loader that runs as a server

Wslink: Unique and undocumented malicious loader that runs as a server

There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor

Vladislav Hrčka27 Oct 2021


Putting cybersecurity first: Why secure-by-design must be the norm

Putting cybersecurity first: Why secure-by-design must be the norm

Putting cybersecurity first: Why secure-by-design must be the norm

Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom

Phil Muncaster26 Oct 2021


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

How to break into cybersecurity – Is your password easy to guess? – Shining a spotlight on the security risks of shadow IT

Editor22 Oct 2021


What’s lurking in the shadows? How to manage the security risks of shadow IT

What’s lurking in the shadows? How to manage the security risks of shadow IT

What’s lurking in the shadows? How to manage the security risks of shadow IT

Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era

Phil Muncaster22 Oct 2021


Apt Activity Report
MDR Protection