Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Ransomware
Two US cities opt to pay $1m to ransomware operators
A few days apart, two cities in Florida cave in to extortionists’ demands in hopes of restoring access to municipal computer systems
Tomáš Foltýn • 26 Jun 2019
Stopping stalkerware: What needs to change?
What technology makers and others can – and should – do to counter the kind of surveillance that starts at home
Lysa Myers • 25 Jun 2019
Cybercrime
Hackers breach NASA, steal Mars mission data
The infiltration was only spotted and stopped after the hackers roamed the network undetected for almost a year
Tomáš Foltýn • 24 Jun 2019
Video
Week in security with Tony Anscombe
ESET researchers throw light on an unusual cryptocurrency miner and on Android apps that can get around 2FA protections
Tomáš Foltýn • 21 Jun 2019
Digital Security
Privacy legislation may soon affect smaller businesses
Why smaller businesses cannot afford to ignore how they gather, store and protect data
Lysa Myers • 21 Jun 2019
LoudMiner: Cross-platform mining in cracked VST software
The story of a Linux miner bundled with pirated copies of VST (Virtual Studio Technology) software for Windows and macOS
Michal Malik and ESET Research • 20 Jun 2019
Mobile Security
You’d better change your birthday – hackers may know your PIN
Are you in the 26% of people who use one of these PIN codes to unlock their phones?
Jake Moore • 19 Jun 2019
Social Media
Instagram tests new ways to recover hacked accounts
Locked out and out of luck? The photo-sharing platform is trialing new methods to reunite you with your lost account
Tomáš Foltýn • 18 Jun 2019
Malware sidesteps Google permissions policy with new 2FA bypass technique
ESET analysis uncovers a novel technique bypassing SMS-based two-factor authentication while circumventing Google’s recent SMS permissions restrictions
Lukas Stefanko • 17 Jun 2019
What are the main security concerns associated with smart buildings and why are they in the crosshairs of cybercriminals?
Tomáš Foltýn • 14 Jun 2019
GDPR one year on: Most Europeans know at least some of their rights
On the other hand, a surprisingly high number of Europeans haven't even heard of the landmark legislation
Spain’s top soccer league fined over its app’s ‘tactics’
La Liga has taken substantial flak for tapping into microphones and geolocation services in fans‘ phones in a bid to root out piracy
Tomáš Foltýn • 12 Jun 2019
Fake cryptocurrency apps crop up on Google Play as bitcoin price rises
Why you should choose a pseudonym at Starbucks
Secure Coding
IT forensic tools: How to find the right one for each incident
Scams
Fake finance apps on Google Play target users from around the world
PowerPool malware exploits ALPC LPE zero-day vulnerability
Sign up for our newsletters