Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks
Steps to take right after a data breach – What to consider before going passwordless – 7 million people hit by Robinhood data breach
It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a breach
The tech giant wins an appeal against a claim that it unlawfully collected personal data of millions of iPhone users
An attacker gained access to some of Robinhood's customer support systems and stole the personal data of a third of the app's userbase
Are the days numbered for ‘123456’? As Microsoft further nudges the world away from passwords, here’s what your organization should consider before going password-free.
What's it like working as a malware researcher? – ProtonMail and the battle for email privacy – Man charged with hacking, trying to extort US sports leagues
Beyond the vulnerability in the Android kernel, the monthly round of security patches plugs another 38 security loopholes
Security and privacy get a leg up in Proton’s legal challenge against data retention and disclosure obligations
Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field
On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000
ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR
What are some of the key dangers faced by children online and how can you help protect them from the ghosts, ghouls and goblins creeping on the internet?
The police sting spanned three continents and involved crackdowns in nine countries
There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor
Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom
How to break into cybersecurity – Is your password easy to guess? – Shining a spotlight on the security risks of shadow IT
Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era
Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track.
Brave Search will become the default search option for new users in the US, UK, Canada, Germany and France, with more countries to follow soon