Latest Articles

Video

Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe

Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe

Video

Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe

What are some of the key cybersecurity trends that people and organizations should have on their radars this year?

Editor05 Jan 2024


How To

Lost and found: How to locate your missing devices and more

Lost and found: How to locate your missing devices and more

How To

Lost and found: How to locate your missing devices and more

Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy

Márk Szabó04 Jan 2024


Privacy

Say what you will? Your favorite speech-to-text app may be a privacy risk

Say what you will? Your favorite speech-to-text app may be a privacy risk

Privacy

Say what you will? Your favorite speech-to-text app may be a privacy risk

Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets.

Martina López03 Jan 2024


Digital Security

A year in review: 10 of the biggest security incidents of 2023

A year in review: 10 of the biggest security incidents of 2023

Digital Security

A year in review: 10 of the biggest security incidents of 2023

As we draw the curtain on another eventful year in cybersecurity, let’s review some of the high-profile cyber-incidents that befell various organizations this year

Phil Muncaster28 Dec 2023


Digital Security

Got a new device? 7 things to do before disposing of your old tech

Got a new device? 7 things to do before disposing of your old tech

Digital Security

Got a new device? 7 things to do before disposing of your old tech

Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information

Phil Muncaster27 Dec 2023


Video

Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe

Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe

Video

Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe

How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET's latest Threat Report

Editor22 Dec 2023


Digital Security

Safeguard the joy: 10 tips for securing your shiny new device

Safeguard the joy: 10 tips for securing your shiny new device

Digital Security

Safeguard the joy: 10 tips for securing your shiny new device

Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly

Phil Muncaster21 Dec 2023


Mobile Security

These aren’t the Androids you should be looking for

These aren’t the Androids you should be looking for

Mobile Security

These aren’t the Androids you should be looking for

You may get more than you bargained for when you buy a budget-friendly smartphone and forgo safeguards baked into Google Play

Roman Cuprik and Thomas Uhlemann20 Dec 2023


ESET Research, Threat Reports

ESET Threat Report H2 2023

ESET Threat Report H2 2023

ESET Research, Threat Reports

ESET Threat Report H2 2023

A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč19 Dec 2023


ESET Research

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces

ESET Research18 Dec 2023


Video

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

Video

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes

Editor15 Dec 2023


ESET Research

OilRig’s persistent attacks using cloud service-powered downloaders

OilRig’s persistent attacks using cloud service-powered downloaders

ESET Research

OilRig’s persistent attacks using cloud service-powered downloaders

ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications

Zuzana Hromcová and Adam Burgher14 Dec 2023