How can you stay safe in a world where “smart” is the new default?
The data breach at the Hong Kong flag carrier is the third such incident to hit the aviation industry in two months
ESET experts have created a new decryption tool that can be used by Syrian victims of the GandCrab ransomware. It is based on a set of keys recently released by the malware operators
The malicious apps have all been removed from the official Android store but not before the apps were installed by almost 30,000 users
As part of his plea agreement, the author of the malware also forfeited the proceeds from his crimes – 114 Bitcoin worth $725,000
The solution to password recycling may be easier to implement than previously thought, according to a recent paper
What are the emotional triggers and errors in judgment that make you fall victim to scammers?
GreyEnergy: ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks
The microblogging platform is assuring its users that has found no evidence that any data was actually stolen
Customers see their admin credentials stolen and their servers infected with Linux/ChachaDDoS
ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things
While the number of victims is lower than previously thought, the data accessed for millions of them is more sensitive than originally believed
Proper preparation can make all the difference when it comes to speaking at conferences
The times they are a-changin‘, so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution?
TeleBots: First evidence linking Industroyer to NotPetya
ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven
As another confusing message spreads, we look at Facebook privacy, cloning, and hacking
The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets
Google has found no evidence of misuse of user information courtesy of a security glitch in the social platform’s API