Latest Articles

Video

Surge in deceptive loan apps – Week in security with Tony Anscombe

Surge in deceptive loan apps – Week in security with Tony Anscombe

Video

Surge in deceptive loan apps – Week in security with Tony Anscombe

ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.

Editor08 Dec 2023


Critical Infrastructure

Black Hat Europe 2023: The past could return to haunt you

Black Hat Europe 2023: The past could return to haunt you

Critical Infrastructure

Black Hat Europe 2023: The past could return to haunt you

Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.

Tony Anscombe08 Dec 2023


Digital Security

To tap or not to tap: Are NFC payments safer?

To tap or not to tap: Are NFC payments safer?

Digital Security

To tap or not to tap: Are NFC payments safer?

Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods?

Márk Szabó07 Dec 2023


Privacy

Navigating privacy: Should we put the brakes on car tracking?

Navigating privacy: Should we put the brakes on car tracking?

Privacy

Navigating privacy: Should we put the brakes on car tracking?

Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable?

Márk Szabó06 Dec 2023


ESET Research

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

ESET Research

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play

Lukas Stefanko05 Dec 2023


Video

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Video

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology

Editor01 Dec 2023


Business Security

Executives behaving badly: 5 ways to manage the executive cyberthreat

Executives behaving badly: 5 ways to manage the executive cyberthreat

Business Security

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

Phil Muncaster30 Nov 2023


Digital Security

Very precisely lost – GPS jamming

Very precisely lost – GPS jamming

Digital Security

Very precisely lost – GPS jamming

The technology is both widely available and well developed, hence it's also poised to proliferate – especially in the hands of those wishing ill

Cameron Camp29 Nov 2023


Business Security

Retail at risk: Top threats facing retailers this holiday season

Retail at risk: Top threats facing retailers this holiday season

Business Security

Retail at risk: Top threats facing retailers this holiday season

While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them

Phil Muncaster28 Nov 2023


Scams, Cybercrime

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

Scams, Cybercrime

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

The holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats

Phil Muncaster27 Nov 2023


Video

Telekopye's tricks of the trade – Week in security with Tony Anscombe

Telekopye's tricks of the trade – Week in security with Tony Anscombe

Video

Telekopye's tricks of the trade – Week in security with Tony Anscombe

ESET's research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online

Editor24 Nov 2023


ESET Research

Telekopye: Chamber of Neanderthals’ secrets

Telekopye: Chamber of Neanderthals’ secrets

ESET Research

Telekopye: Chamber of Neanderthals’ secrets

Insight into groups operating Telekopye bots that scam people in online marketplaces

Radek Jizba23 Nov 2023


Apt Activity Report
MDR Protection