Does every device in your home really need to be connected to the internet? And could your smart appliance be turned against you?
From losing cherished memories to missing deadlines, the impact of not having backups when a data disaster strikes can hardly be overstated
Had the incident gone unnoticed, the attackers could have taken over websites using the tainted code
The bug is under active exploitation by unknown attackers and affects a wide range of devices, including iPhones, iPads and Apple Watches
Security and your right to repair – Scams offer fake COVID-19 vaccines and ask for Bitcoin – Jail time for a disgruntled IT contractor
Money doesn’t buy you happiness – cryptocurrency doesn’t buy you a genuine COVID-19 vaccine
The company was left to deal with three months’ worth of IT problems
Nearly half of reported cybercrime losses in 2020 were the result of BEC fraud, according to an FBI report
How do you balance the right to repair with the requirement to remain secure?
Why do many organizations have a hard time keeping up with the evolving threat landscape and effectively managing their cyber-risks?
A banking trojan masquerades as Clubhouse for Android – The implications of the Verkada breach – A zero-day patched in Chrome
Follow these easy steps to prevent your Twitter account from being hacked and to remain safe while tweeting
When a breach captures a part of us that is unchangeable, does it mean that we have allowed technology to pry too deeply into our lives?
The Bureau received over 28,000 reports of COVID-19-themed scams last year
The malware can grab login credentials for more than 450 apps and bypass SMS-based two-factor authentication
The latest update patches a total of five vulnerabilities affecting the browser’s desktop versions
From overpayment to shipping scams, what are some of the most common threats that merchants using PayPal should watch out for?
ESET research into exploitation of Microsoft Exchange flaws – How smart sex toys may expose your privacy – E-health versus your personal data
ESET researchers investigate what could possibly go wrong when you connect your bedroom to the internet of things
ESET Research has found LuckyMouse, Tick, Winnti Group, and Calypso, among others, are likely using the recent Microsoft Exchange vulnerabilities to compromise email servers all around the world