Simply throwing more staff at the patching problem won’t cut it, a study suggests.
Securely keeping track of data and security applications
Can the electoral processes be protected?
An interview with ESET’s Lukáš Štefanko on the thin line between what deserves the name “security app” and what can be called fake.
As Internet crime knows no borders, mutual legal assistance involving various nations and, by extension, requests for extraditing suspected cyber-offenders are sometimes part and parcel of prosecution efforts.
The long arm of the law caught up with a number of cybercriminals in the first three months of this year.
An unusual ransomware request has been uncovered by researchers.
A closer look at Anti-Malware tests and the sometimes unreliable nature of the process.
In Part 1, our roundup of some of the most notable law enforcement actions against computer crime in the first quarter of 2018 will focus on arrests and charges involving suspected cyber-crooks.
Criminals have devised a new scheme that aims to drain the bank accounts of large corporations.
Hackers have managed to deface an array of popular YouTube music videos, changing titles and thumbnail images.
WeLiveSecurity sat down with Tony Anscombe, Global Security Evangelist and Industry Ambassador for ESET, to talk about RSA 2018, his talk at the conference, and what to expect.
The 2016 compromise of the league’s Twitter account is one of a number of high-profile social media hijackings.
Most of the White House's email domains have yet to deploy an email authentication protocol known as DMARC that is designed to reduce the risk of attackers impersonating legitimate email addresses for distributing spam or phishing messages.
Cybercriminals are believed to have stolen information for more than five million credit and debit cards that shoppers had used at dozens of Saks Fifth Avenue, Saks Off 5th and Lord & Taylor stores mainly in the United States between May 2017 and March 2018.
ESET researchers have analyzed a newly discovered set of apps on Google Play, Google's official Android app store, that pose as security applications. Instead of security, all they provide is unwanted ads and ineffective pseudo-security.
The tech giant is taking the measure after a rise in malicious browser extensions that mine digital money by hijacking the processing power of users' computers. The clampdown follows Google’s recent move to stop serving any and all adverts promoting virtual currencies and initial coin offerings.
Implementing the five actions described in this article can help reduce your organization's cyber risk and bolster its security defenses
The Lazarus Group gained notoriety especially after cyber-sabotage against Sony Pictures Entertainment in 2014. Fast forward to late 2017 and the group continues to deploy its malicious tools, including disk-wiping malware known as KillDisk, to attack a number of targets.
The update plugs a security hole that exposes a million Drupal websites to attacks