NSA shares advice on how to limit location tracking
The intelligence agency warns of location tracking risks and offers tips for how to reduce the amount of data shared
The intelligence agency warns of location tracking risks and offers tips for how to reduce the amount of data shared
In one scheme, shoppers ordering gadgets or gym equipment are in for a rude surprise – they receive disposable face masks instead
The going prices are lower than you probably think – your credit card details, for example, can sell for a few bucks
New ESET Threat Report is out – Defending against Thunderspy attacks – Thousands of databases wiped in Meow attacks
The attackers exploited the human factor to gain access to Twitter’s internal systems and the accounts of some of the world’s most prominent figures
The databases contain personal information that could be used for phishing attacks and identity theft schemes
All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface
A view of the Q2 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
The Bureau expects cybercriminals to increasingly abuse new threat vectors for large-scale DDoS attacks
The attackers and their motivations remain unknown; however, the incidents yet again highlight the risks of careless data security
VPN services accused of leaking personal data – Better security in Gmail, Meet and Chat – Data breach reports in 1H2020
In another incident, ransomware attackers almost forced the cancellation of a match, a report reveals
The tech giant introduces its own version of verified accounts in Gmail, rolls out increased moderation controls in Meet, and enhances phishing protection in Chat
The open letter highlights five security and privacy principles that require heightened attention from videoconferencing services
Telecom Argentina says it has contained the attack and regained access to its systems without paying up
A report calls into question the providers’ security practices and dismisses their claims of being no-log VPN services
The Identity Theft Resource Center doesn't expect the trend to last, however
Trojanized cryptocurrency trading apps targeting Mac users – An Android chat app turns out to be spyware – Twitter sustains a massive hack
Tech titans and prominent politicians among victims of a sprawling hack that Twitter says leveraged its internal tools
ESET researchers lure GMERA malware operators to remotely control their Mac honeypots