The virtual keyboard app ai.type, which has racked up 40 million downloads, has been found to sign up users to premium services without their consent
How can organizations foster a workplace environment that enables employees to acquire the skills needed to keep cyber-threats at bay?
The introduction to a series of articles marking this year’s Antimalware Day and highlighting the importance of cyber-readiness
When we hear about a breach, we assume that attackers used a fiendish exploit to breach the victim's defenses – but is this how breaches typically occur?
Even if you are careful about what you download, chances are your children will be less cautious. Here’s how you can help them – and your entire family – stay safe.
Is the world as we know it ready for the real impact of deepfakes?
However, the social network harbors no plans to deploy the technology in any of its services any time soon
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead
This week, ESET researchers released their findings on Winnti Group's MSSQL backdoor and showed how they'd tracked down the operator of an adware campaign that victimized millions of Android users.
The study tested 81 IoT devices to analyze their behavior and tracking habits, and in some cases brought rather surprising findings
How is the social network preparing to curtail the spread of misinformation as the election season heats up?
ESET researchers discovered a year-long adware campaign on Google Play and tracked down its operator. The apps involved, installed eight million times, use several tricks for stealth and persistence.
As cities turn to IoT to address long-standing urban problems, what are the risks of leaving cybersecurity behind at the planning phase?
The company says that the incident, going back to March 2018, affected only 1 out of its 3,000 servers
Notorious cyberespionage group debases MSSQL
This week, ESET experts described recent shenanigans of The Dukes and the Winnti Group, vulnerabilities in Amazon Echo and Kindle, and a fake Tor Browser stealing cryptocurrency
ESET researchers discover a trojanized Tor Browser distributed by cybercriminals to steal bitcoins from darknet market buyers
ESET Smart Home Research Team uncovers Echo, Kindle versions vulnerable to 2017 Wi-Fi vulnerabilities
ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families
Do you know what kind of data your streaming device may be collecting while you binge watch?