It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
Smartphones are kids’ trusty companions both in- and outside the classroom, and as they return to their desks, we’ve prepared some handy tips on how to keep their devices secure.
The victims lost an average of nine days to downtime and two-and-a-half months to investigations, an analysis of disclosed attacks shows
ESET cybersecurity expert Marc-Étienne Léveillé analyses in-depth the Quebec vaccine proof apps VaxiCode and VaxiCode Verif.
What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks
Phishing and how to avoid taking the bait – Offboarding employees securely – Why old malware refuses to die
New ESET Threat Report is out – Cybersecurity Awareness Month begins today – What organizations should do to secure their VPNs
ESET research discovers SideWalk backdoor – Why data breach costs have never been higher – 620,000 personal pictures stolen from iCloud accounts
Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds
The university suffered a ransomware attack; however, there is no evidence so far of data being accessed or stolen.
ESET research discovers ESPecter bootkit – FontOnLake targeting Linux – Fake SafeMoon app update
Cyberespionnage against Kurdish ethnic group, and more! – Week in security with Tony Anscombe
The emergency release comes a mere three days after Google’s previous update that plugged another 19 security loopholes
The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks.
The campaign may last for a month, but we should remember that cybersecurity is a year-round affair
The federal agency urges organizations to ditch the bad practice and instead use multi-factor authentication methods
The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML.
The caches of data that were publicly accessible included names, email addresses and social security numbers
The group used phishing, BEC and other types of attacks to swindle victims out of millions