Latest Articles

Digital Security

One login to rule them all: Should you sign in with Google or Facebook on other websites?

One login to rule them all: Should you sign in with Google or Facebook on other websites?

Digital Security

One login to rule them all: Should you sign in with Google or Facebook on other websites?

Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. What’s the trade-off?

André Lameiras23 Oct 2023


Video

Spearphishing targets in Latin America – Week in security with Tony Anscombe

Spearphishing targets in Latin America – Week in security with Tony Anscombe

Video

Spearphishing targets in Latin America – Week in security with Tony Anscombe

ESET's analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including those targeting enterprises and governments

Editor20 Oct 2023


Business Security

Strengthening the weakest link: top 3 security awareness topics for your employees

Strengthening the weakest link: top 3 security awareness topics for your employees

Business Security

Strengthening the weakest link: top 3 security awareness topics for your employees

Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats

Phil Muncaster19 Oct 2023


Business Security

Better safe than sorry: 10 tips to build an effective business backup strategy

Better safe than sorry: 10 tips to build an effective business backup strategy

Business Security

Better safe than sorry: 10 tips to build an effective business backup strategy

How robust backup practices can help drive resilience and improve cyber-hygiene in your company

Phil Muncaster18 Oct 2023


ESET Research

Operation King TUT: The universe of threats in LATAM

Operation King TUT: The universe of threats in LATAM

ESET Research

Operation King TUT: The universe of threats in LATAM

ESET researchers reveal a growing sophistication in threats affecting the LATAM region by employing evasion techniques and high-value targeting

Camilo Gutiérrez Amaya and Fernando Tavella17 Oct 2023


Video

Staying on top of security updates – Week in security with Tony Anscombe

Staying on top of security updates – Week in security with Tony Anscombe

Video

Staying on top of security updates – Week in security with Tony Anscombe

Why keeping software up to date is a crucial security practice that should be followed by everyone from individual users to SMBs and large enterprises

Editor13 Oct 2023


Cybercrime

Virus Bulletin – building digital armies

Virus Bulletin – building digital armies

Cybercrime

Virus Bulletin – building digital armies

Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack

Cameron Camp11 Oct 2023


Business Security

6 steps to getting the board on board with your cybersecurity program

6 steps to getting the board on board with your cybersecurity program

Business Security

6 steps to getting the board on board with your cybersecurity program

How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives

Phil Muncaster11 Oct 2023


Digital Security

Virus Bulletin PUA – a love letter

Virus Bulletin PUA – a love letter

Digital Security

Virus Bulletin PUA – a love letter

Late nights at VB2023 featured intriguing interactions between security experts and the somewhat enigmatic world of grayware purveyors

Cameron Camp10 Oct 2023


Digital Security

Your family, home and small business need a cyber-resilience strategy, too!

Your family, home and small business need a cyber-resilience strategy, too!

Digital Security

Your family, home and small business need a cyber-resilience strategy, too!

Your preparedness to deal with cyberattacks is key for lessening the impact of a successful incident – even in home and small business environments

Tony Anscombe09 Oct 2023


Video

DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe

DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe

Video

DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe

The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine

Editor06 Oct 2023


Social Media

Fake friends and followers on social media – and how to spot them

Fake friends and followers on social media – and how to spot them

Social Media

Fake friends and followers on social media – and how to spot them

One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.

Phil Muncaster06 Oct 2023