Latest Articles

Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe

Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe

Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe

A look back on the key trends and developments that shaped the cyberthreat landscape from May to August of this year

Editor07 Oct 2022


The need to change cybersecurity for the next generation

The need to change cybersecurity for the next generation

The need to change cybersecurity for the next generation

Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits

Tony Anscombe06 Oct 2022


ESET Threat Report T2 2022

ESET Threat Report T2 2022

ESET Threat Report T2 2022

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč05 Oct 2022


8 questions to ask yourself before getting a home security camera

8 questions to ask yourself before getting a home security camera

8 questions to ask yourself before getting a home security camera

As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?

Phil Muncaster03 Oct 2022


ESET research into new attacks by Lazarus – Week in security with Tony Anscombe

ESET research into new attacks by Lazarus – Week in security with Tony Anscombe

ESET research into new attacks by Lazarus – Week in security with Tony Anscombe

The attack involved the first recorded abuse of a security vulnerability in a Dell driver that was patched in May 2021

Editor30 Sep 2022


Amazon-themed campaigns of Lazarus in the Netherlands and Belgium

Amazon-themed campaigns of Lazarus in the Netherlands and Belgium

Amazon-themed campaigns of Lazarus in the Netherlands and Belgium

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers

Peter Kálnai30 Sep 2022


Protecting teens from sextortion: What parents should know

Protecting teens from sextortion: What parents should know

Protecting teens from sextortion: What parents should know

Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online

Phil Muncaster28 Sep 2022


What happens with a hacked Instagram account – and how to recover it

What happens with a hacked Instagram account – and how to recover it

What happens with a hacked Instagram account – and how to recover it

Had your Instagram account stolen? Don’t panic – here’s how to get your account back and how to avoid getting hacked (again)

Jake Moore26 Sep 2022


What to consider before disposing of personal data – Week in security with Tony Anscombe

What to consider before disposing of personal data – Week in security with Tony Anscombe

What to consider before disposing of personal data – Week in security with Tony Anscombe

A major financial services company has learned the hard way about the importance of proper disposal of customers' personal data

Editor23 Sep 2022


5 tips to help children navigate the internet safely

5 tips to help children navigate the internet safely

5 tips to help children navigate the internet safely

The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits?

André Lameiras23 Sep 2022


Hey WeLiveSecurity, how does biometric authentication work?

Hey WeLiveSecurity, how does biometric authentication work?

Hey WeLiveSecurity, how does biometric authentication work?

Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?

André Lameiras22 Sep 2022


Can your iPhone be hacked? What to know about iOS security

Can your iPhone be hacked? What to know about iOS security

Can your iPhone be hacked? What to know about iOS security

Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device

André Lameiras19 Sep 2022


Apt Activity Report
MDR Protection