Latest Articles

Business Security, Digital Security

Delivering trust with DNS security

Delivering trust with DNS security

Business Security, Digital Security

Delivering trust with DNS security

Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?

Alžbeta Kovaľová13 Dec 2023


ESET Research

A pernicious potpourri of Python packages in PyPI

A pernicious potpourri of Python packages in PyPI

ESET Research

A pernicious potpourri of Python packages in PyPI

The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository

Marc-Etienne M.Léveillé and Rene Holt12 Dec 2023


We Live Progress

Black Hat Europe 2023: Should we regulate AI?

Black Hat Europe 2023: Should we regulate AI?

We Live Progress

Black Hat Europe 2023: Should we regulate AI?

ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?

Tony Anscombe11 Dec 2023


Mobile Security

Silent but deadly: The rise of zero-click attacks

Silent but deadly: The rise of zero-click attacks

Mobile Security

Silent but deadly: The rise of zero-click attacks

A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.

Márk Szabó11 Dec 2023


Video

Surge in deceptive loan apps – Week in security with Tony Anscombe

Surge in deceptive loan apps – Week in security with Tony Anscombe

Video

Surge in deceptive loan apps – Week in security with Tony Anscombe

ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.

Editor08 Dec 2023


Critical Infrastructure

Black Hat Europe 2023: The past could return to haunt you

Black Hat Europe 2023: The past could return to haunt you

Critical Infrastructure

Black Hat Europe 2023: The past could return to haunt you

Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.

Tony Anscombe08 Dec 2023


Digital Security

To tap or not to tap: Are NFC payments safer?

To tap or not to tap: Are NFC payments safer?

Digital Security

To tap or not to tap: Are NFC payments safer?

Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods?

Márk Szabó07 Dec 2023


Privacy

Navigating privacy: Should we put the brakes on car tracking?

Navigating privacy: Should we put the brakes on car tracking?

Privacy

Navigating privacy: Should we put the brakes on car tracking?

Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable?

Márk Szabó06 Dec 2023


ESET Research

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

ESET Research

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play

Lukas Stefanko05 Dec 2023


Video

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Video

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology

Editor01 Dec 2023


Business Security

Executives behaving badly: 5 ways to manage the executive cyberthreat

Executives behaving badly: 5 ways to manage the executive cyberthreat

Business Security

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

Phil Muncaster30 Nov 2023


Digital Security

Very precisely lost – GPS jamming

Very precisely lost – GPS jamming

Digital Security

Very precisely lost – GPS jamming

The technology is both widely available and well developed, hence it's also poised to proliferate – especially in the hands of those wishing ill

Cameron Camp29 Nov 2023