Latest Articles

The many faces of impersonation fraud: Spot an imposter before it’s too late

The many faces of impersonation fraud: Spot an imposter before it’s too late

The many faces of impersonation fraud: Spot an imposter before it’s too late

What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be?

Phil Muncaster18 Apr 2024


The ABCs of how online ads can impact children’s well-being

The ABCs of how online ads can impact children’s well-being

The ABCs of how online ads can impact children’s well-being

From promoting questionable content to posing security risks, inappropriate ads present multiple dangers for children. Here’s how to help them stay safe.

Imogen Byers16 Apr 2024


Bitcoin scams, hacks and heists – and how to avoid them

Bitcoin scams, hacks and heists – and how to avoid them

Bitcoin scams, hacks and heists – and how to avoid them

Here’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin or other crypto safe

Phil Muncaster15 Apr 2024


eXotic Visit includes XploitSPY malware – Week in security with Tony Anscombe

eXotic Visit includes XploitSPY malware – Week in security with Tony Anscombe

eXotic Visit includes XploitSPY malware – Week in security with Tony Anscombe

Almost 400 people in India and Pakistan have fallen victim to an ongoing Android espionage campaign called eXotic Visit

Editor12 Apr 2024


Beyond fun and games: Exploring privacy risks in children’s apps

Beyond fun and games: Exploring privacy risks in children’s apps

Beyond fun and games: Exploring privacy risks in children’s apps

Should children’s apps come with ‘warning labels’? Here's how to make sure your children's digital playgrounds are safe places to play and learn.

Phil Muncaster11 Apr 2024


eXotic Visit campaign: Tracing the footprints of Virtual Invaders

eXotic Visit campaign: Tracing the footprints of Virtual Invaders

eXotic Visit campaign: Tracing the footprints of Virtual Invaders

ESET researchers uncovered the eXotic Visit espionage campaign that targets users mainly in India and Pakistan with seemingly innocuous apps

Lukas Stefanko10 Apr 2024


7 reasons why cybercriminals want your personal data

7 reasons why cybercriminals want your personal data

7 reasons why cybercriminals want your personal data

Here's what drives cybercriminals to relentlessly target the personal information of other people – and why you need to guard your data like your life depends on it

Tomáš Foltýn08 Apr 2024


The devil is in the fine print – Week in security with Tony Anscombe

The devil is in the fine print – Week in security with Tony Anscombe

The devil is in the fine print – Week in security with Tony Anscombe

Temu's cash giveaway where people were asked to hand over vast amounts of their personal data to the platform puts the spotlight on the data-slurping practices of online services today

Editor05 Apr 2024


How often should you change your passwords?

How often should you change your passwords?

How often should you change your passwords?

And is that actually the right question to ask? Here’s what else you should consider when it comes to keeping your accounts safe.

Phil Muncaster03 Apr 2024


Malware hiding in pictures? More likely than you think

Malware hiding in pictures? More likely than you think

Malware hiding in pictures? More likely than you think

There is more to some images than meets the eye – their seemingly innocent façade can mask a sinister threat.

Márk Szabó02 Apr 2024


RDP remains a security concern – Week in security with Tony Anscombe

RDP remains a security concern – Week in security with Tony Anscombe

RDP remains a security concern – Week in security with Tony Anscombe

Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result

Editor29 Mar 2024


Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

This rundown of 10 cyberattacks against the sports industry shows why every team needs to keep its eyes on the ball when it comes to cybersecurity

Tomáš Foltýn28 Mar 2024


Apt Activity Report
MDR Protection