Fifty shades of vulnerable: How to play it safe with your smart sex toy
While you’re living out your fantasies, your internet-enabled sex toy may be setting you up for a privacy nightmare
While you’re living out your fantasies, your internet-enabled sex toy may be setting you up for a privacy nightmare
What can municipalities do to better protect their water supply systems?
This month’s relatively humble bundle of security updates fixes 56 vulnerabilities, including a zero-day bug and 11 flaws rated as critical
While the incursion was thwarted in time, cyberattacks targeting critical infrastructure are a major cause for concern
A view of the Q4 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
ESET unearths a supply-chain attack against an Android emulator for PC and Mac – ESET research into malware targeting HPC clusters – How to prevent at least some zero-days
Vendors should fix the root cause of a vulnerability, rather than block just one path to triggering it, says Google
Sharing your thoughts or photos for the world to see is now as easy as pushing a button, but even a seemingly harmless post may come back to haunt you
The US Federal Trade Commission received 1.4 million reports of identity theft last year, double the number from 2019
ESET researchers publish a white paper about unique multiplatform malware they’ve named Kobalos
ESET researchers uncover a supply-chain attack used in a cyberespionage operation targeting online‑gaming communities in Asia
Law enforcement disrupts Emotet – Wormable Android malware spreading via WhatsApp – Three iOS zero-day bugs squashed
The law enforcement action is one of the most significant operations against cybercriminal enterprises ever
As schools and students continue to contend with the very real cyber-risks of virtual classrooms, we share some advice for protecting children’s data and privacy
The company emits emergency updates to fix bugs affecting devices ranging from iPhones to Apple Watches
“Download This application and Win Mobile Phone”, reads the message attempting to trick users into downloading a fake Huawei app
ESET research analyzes the Vadokrist banking trojan – Beware smishing scams – WhatsApp postpones privacy policy changes
Here’s how to spot scams where criminals use deceptive text messages to hook and reel in their marks
Another in our occasional series demystifying Latin American banking trojans
Security flaws in a widely used DNS software package could allow attackers to send users to malicious websites or to remotely hijack their devices