Zoom now supports two-factor authentication – A cyber attack hits 14 inboxes belonging to Quebec’s Department of Justice
What are some common strategies cybercriminals employ in extortion schemes and how can you mitigate the chances of falling victim to a cyber-shakedown?
While wanting to return a found USB flash drive is commendable, you should avoid taking unnecessary risks, lest your device get infested and your data compromised
The cyberattack, which affected 14 inboxes belonging to the Department of Justice, was confirmed by ESET researchers
Sports and training data are more sophisticated and affordable than ever. With the democratization of (sports) performance data, is your personal information safe?
Zoom now supports phone calls, text messages and authentication apps as forms of two-factor authentication
ESET researchers discover and analyze CDRThief, malware that targets Voice over IP (VoIP) softswitches
Oregon’s largest city aims to be a trailblazer when it comes to facial recognition legislation
ESET researchers have discovered and analyzed malware that targets Voice over IP (VoIP) softswitches
The cyber-incident takes most of the university’s systems offline and officials estimate that the institution will take weeks to recover
…but there are no conferences or exhibitions???
With TikTok being all the rage especially with teens, we look at a feature that gives parents greater control over how their children interact with the app
ESET research dissects KryptoCibule malware family – Why close unused accounts rather than just remove apps – Microsoft's new deepfake detector
As the US presidential election nears, the company’s new tech should also help assure people that an image or video is authentic
What’s the benefit of deleting your Houseparty – or any other unused – account, rather than just uninstalling the app?
Unknown threat actors were able to exfiltrate information from the email accounts of several parliamentarians
ESET researchers analyze a previously undocumented trojan that is spread via malicious torrents and uses multiple tricks to squeeze cryptocoins from its victims while staying under the radar
The vulnerability could allow criminals to rack up fraudulent charges on the cards without needing to know the PINs
Canada's government services hit by cyberattacks – Vishing attacks surge amid COVID-19 pandemic – DDoS extortionists strike again
The extortionists attempt to scare the targets into paying by claiming to represent some of the world’s most notorious APT groups