Latest Articles

Privacy

Navigating privacy: Should we put the brakes on car tracking?

Navigating privacy: Should we put the brakes on car tracking?

Privacy

Navigating privacy: Should we put the brakes on car tracking?

Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable?

Márk Szabó06 Dec 2023


ESET Research

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

ESET Research

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play

Lukas Stefanko05 Dec 2023


Video

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Video

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology

Editor01 Dec 2023


Business Security

Executives behaving badly: 5 ways to manage the executive cyberthreat

Executives behaving badly: 5 ways to manage the executive cyberthreat

Business Security

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

Phil Muncaster30 Nov 2023


Digital Security

Very precisely lost – GPS jamming

Very precisely lost – GPS jamming

Digital Security

Very precisely lost – GPS jamming

The technology is both widely available and well developed, hence it's also poised to proliferate – especially in the hands of those wishing ill

Cameron Camp29 Nov 2023


Business Security

Retail at risk: Top threats facing retailers this holiday season

Retail at risk: Top threats facing retailers this holiday season

Business Security

Retail at risk: Top threats facing retailers this holiday season

While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them

Phil Muncaster28 Nov 2023


Scams, Cybercrime

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

Scams, Cybercrime

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

The holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats

Phil Muncaster27 Nov 2023


Video

Telekopye's tricks of the trade – Week in security with Tony Anscombe

Telekopye's tricks of the trade – Week in security with Tony Anscombe

Video

Telekopye's tricks of the trade – Week in security with Tony Anscombe

ESET's research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online

Editor24 Nov 2023


ESET Research

Telekopye: Chamber of Neanderthals’ secrets

Telekopye: Chamber of Neanderthals’ secrets

ESET Research

Telekopye: Chamber of Neanderthals’ secrets

Insight into groups operating Telekopye bots that scam people in online marketplaces

Radek Jizba23 Nov 2023


Digital Security

Your voice is my password

Your voice is my password

Digital Security

Your voice is my password

AI-driven voice cloning can make things far too easy for scammers – I know because I’ve tested it so that you don’t have to learn about the risks the hard way.

Jake Moore22 Nov 2023


Digital Security

Fuel for thought: Can a driverless car get arrested?

Fuel for thought: Can a driverless car get arrested?

Digital Security

Fuel for thought: Can a driverless car get arrested?

What happens when problems caused by autonomous vehicles are not the result of errors, but the result of purposeful attacks?

Aryeh Goretsky and Cameron Camp21 Nov 2023


Video

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

Video

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause

Editor17 Nov 2023