Latest Articles

Video

Telekopye's tricks of the trade – Week in security with Tony Anscombe

Telekopye's tricks of the trade – Week in security with Tony Anscombe

Video

Telekopye's tricks of the trade – Week in security with Tony Anscombe

ESET's research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online

Editor24 Nov 2023


ESET Research

Telekopye: Chamber of Neanderthals’ secrets

Telekopye: Chamber of Neanderthals’ secrets

ESET Research

Telekopye: Chamber of Neanderthals’ secrets

Insight into groups operating Telekopye bots that scam people in online marketplaces

Radek Jizba23 Nov 2023


Digital Security

Your voice is my password

Your voice is my password

Digital Security

Your voice is my password

AI-driven voice cloning can make things far too easy for scammers – I know because I’ve tested it so that you don’t have to learn about the risks the hard way.

Jake Moore22 Nov 2023


Digital Security

Fuel for thought: Can a driverless car get arrested?

Fuel for thought: Can a driverless car get arrested?

Digital Security

Fuel for thought: Can a driverless car get arrested?

What happens when problems caused by autonomous vehicles are not the result of errors, but the result of purposeful attacks?

Aryeh Goretsky and Cameron Camp21 Nov 2023


Video

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

Video

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause

Editor17 Nov 2023


Social Media

Is your LinkedIn profile revealing too much?

Is your LinkedIn profile revealing too much?

Social Media

Is your LinkedIn profile revealing too much?

How much contact and personal information do you give away in your LinkedIn profile and who can see it? Here’s why less may be more.

Daniel Cunha Barbosa16 Nov 2023


We Live Progress

Level up! These games will make learning about cybersecurity fun

Level up! These games will make learning about cybersecurity fun

We Live Progress

Level up! These games will make learning about cybersecurity fun

Discover six games that will provide valuable knowledge while turning learning about digital security into an enjoyable and rewarding adventure

Luiza Pires14 Nov 2023


Secure Coding

Capture the flag: 5 websites to sharpen your hacking skills

Capture the flag: 5 websites to sharpen your hacking skills

Secure Coding

Capture the flag: 5 websites to sharpen your hacking skills

Through engaging hacking challenges and competitions, CTFs offer an excellent opportunity to test and enhance your security and problem-solving skills

Christian Ali Bravo13 Nov 2023


Video

Spyware disguised as a news app – Week in security with Tony Anscombe

Spyware disguised as a news app – Week in security with Tony Anscombe

Video

Spyware disguised as a news app – Week in security with Tony Anscombe

The Urdu version of the Hunza News website offers readers the option to download an Android app – little do they know that the app is actually spyware

Editor10 Nov 2023


Business Security

Cyber threat intelligence: Getting on the front foot against adversaries

Cyber threat intelligence: Getting on the front foot against adversaries

Business Security

Cyber threat intelligence: Getting on the front foot against adversaries

By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk

Phil Muncaster10 Nov 2023


ESET Research

Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan

Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan

ESET Research

Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan

ESET researchers discovered Kamran, previously unknown malware, which spies on Urdu-speaking readers of Hunza News

Lukas Stefanko09 Nov 2023


Business Security

Navigating the security and privacy challenges of large language models

Navigating the security and privacy challenges of large language models

Business Security

Navigating the security and privacy challenges of large language models

Organizations that intend to tap into the potential of LLMs must also be able to manage the risks that could otherwise erode the technology’s business value

Phil Muncaster06 Nov 2023