Week in security with Tony Anscombe
How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice
How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice
‘Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products
With the holiday shopping bonanza right around the corner, here's how to make sure your online spending spree is safe
Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends
Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed
ESET discovers watering hole attacks in the Middle East – Getting your life back on track after identity theft – How foreign influence operations have evolved
Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks.
US Government declassifies cybersecurity subjects they want you to learn about, and is hoping to pay you to learn them
A victim of identity theft tells us how criminals used his identity to commit fraud and what it took to put his life back in order
ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high‑profile websites in the Middle East
Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks
Steps to take right after a data breach – What to consider before going passwordless – 7 million people hit by Robinhood data breach
It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a breach
The tech giant wins an appeal against a claim that it unlawfully collected personal data of millions of iPhone users
An attacker gained access to some of Robinhood's customer support systems and stole the personal data of a third of the app's userbase
Are the days numbered for ‘123456’? As Microsoft further nudges the world away from passwords, here’s what your organization should consider before going password-free.
What's it like working as a malware researcher? – ProtonMail and the battle for email privacy – Man charged with hacking, trying to extort US sports leagues
Beyond the vulnerability in the Android kernel, the monthly round of security patches plugs another 38 security loopholes
Security and privacy get a leg up in Proton’s legal challenge against data retention and disclosure obligations
Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field