Latest Articles

Webcam hacking: How to know if someone may be spying on you through your webcam

Webcam hacking: How to know if someone may be spying on you through your webcam

Webcam hacking: How to know if someone may be spying on you through your webcam

Camfecting doesn’t ‘just’ invade your privacy – it could seriously impact your mental health and wellbeing. Here’s how to keep an eye on your laptop camera.

Phil Muncaster25 Apr 2022


Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

As the Five Eyes nations warn of attacks against critical infrastructure, we look at the potentially cascading effects of such attacks and how essential systems and services can ramp up their defense

Editor22 Apr 2022


Critical infrastructure: Under cyberattack for longer than you might think

Critical infrastructure: Under cyberattack for longer than you might think

Critical infrastructure: Under cyberattack for longer than you might think

Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services

André Lameiras21 Apr 2022


Is your Lenovo laptop vulnerable to cyberattack?

Is your Lenovo laptop vulnerable to cyberattack?

Is your Lenovo laptop vulnerable to cyberattack?

Here’s what to know about vulnerabilities in more than 100 Lenovo consumer laptop models and what you can do right away to stay safe – all in under three minutes

Tony Anscombe20 Apr 2022


When "secure" isn't secure at all: High-impact UEFI vulnerabilities discovered in Lenovo consumer laptops

When "secure" isn't secure at all: High-impact UEFI vulnerabilities discovered in Lenovo consumer laptops

When "secure" isn't secure at all: High-impact UEFI vulnerabilities discovered in Lenovo consumer laptops

ESET researchers discover multiple vulnerabilities in various Lenovo laptop models that allow an attacker with admin privileges to expose the user to firmware-level malware

Martin Smolár19 Apr 2022


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Ukrainian energy provider targeted by Industroyer2 – ESET helps disrupt Zloader botnets – Where do new ideas come from and how are they spread?

Editor14 Apr 2022


ESET takes part in global operation to disrupt Zloader botnets

ESET takes part in global operation to disrupt Zloader botnets

ESET takes part in global operation to disrupt Zloader botnets

ESET researchers provided technical analysis, statistical information, and known command and control server domain names and IP addresses

Jean-Ian Boutin and Tomáš Procházka13 Apr 2022


Industroyer2: Industroyer reloaded

Industroyer2: Industroyer reloaded

Industroyer2: Industroyer reloaded

This ICS-capable malware targets a Ukrainian energy company

ESET Research12 Apr 2022


Week in security with Tony Anscombe

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Fake e-shops & Android malware – A journey into the dark recesses of the world wide web – Keeping your cloud resources safe

Editor08 Apr 2022


How secure is your cloud storage? Mitigating data security risks in the cloud

How secure is your cloud storage? Mitigating data security risks in the cloud

How secure is your cloud storage? Mitigating data security risks in the cloud

As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice

Phil Muncaster07 Apr 2022


Fake e-shops on the prowl for banking credentials using Android malware

Fake e-shops on the prowl for banking credentials using Android malware

Fake e-shops on the prowl for banking credentials using Android malware

ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks

Lukas Stefanko06 Apr 2022


We’re going on Tor

We’re going on Tor

We’re going on Tor

If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser.

Jake Moore05 Apr 2022


Apt Activity Report
MDR Protection