Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 22 Jul 2024 • 5 min. read
ESET Research
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
Romain Dumont • 18 Jul 2024 • 23 min. read
HotPage: Story of a signed, vulnerable, ad-injecting driver
Jiří Kropáč • 27 Jun 2024 • 2 min. read
ESET Research, Threat Reports
ESET Threat Report H1 2024
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Digital Security
5 key aspects for safe virtualization
Camilo Gutierrez Amaya looks at five key aspects for aspects that companies should be taken into consideration when developing a virtualization project.
Camilo Gutiérrez Amaya • 19 Nov 2015
Secure Coding
Birds of a feather code together
Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security - while there is much to be done, there's a lot to be optimistic about she says.
Lysa Myers • 18 Nov 2015
Instagram’s new API policy toughens access to its feed
Instagram's new API policy makes it a lot harder for third party apps to gain access to its feed. News of this comes on the back of a malicious app harvesting its user’s details.
Narinder Purba • 18 Nov 2015
Malware, Cybercrime
Fighting talk from Great Britain as it says it will hit back against internet attacks
British chancellor George Osborne has warned about the spectre of online terrorists attacking national infrastructure, and made some rather bold pronouncements about the UK's willingness to engage in cyberwarfare to defend itself.
Graham Cluley • 18 Nov 2015
UK commits to new National Cyber Centre in 2016
The UK’s chancellor, George Osborne, has revealed that a new National Cyber Centre will be developed in 2016, helping the UK deliver a robust and centralized response to this growing threat.
Narinder Purba • 17 Nov 2015
Apple’s Tim Cook: There’ll be no backdoor in encryption
Apple’s Tim Cook has said in an interview with the Irish Independent that the idea of introducing backdoor access into encryption is 'firmly off' its agenda.
Narinder Purba • 16 Nov 2015
The security review: ammyy.com malware, child safety in the digital age and email security boost
Not quite sure what were the most interesting and intriguing information security stories of the past week? Not to worry – the security review has you covered.
Editor • 16 Nov 2015
Cybercrime
Jail for British DDoS attacker, who said too much on Twitter
Although it's far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty of people who have been put behind bars because of this modern-day crime.
Graham Cluley • 13 Nov 2015
Privacy
Reclaim privacy with operational security says Snowden
Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.
Narinder Purba • 13 Nov 2015
7 things you need to know about car hacking
Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely to happen much more regularly in the future. We look at the top facts you need to know about this emerging trend.
Editor • 13 Nov 2015
Why continuous vulnerability assessments are necessary
The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.
Miguel Ángel Mendoza • 12 Nov 2015
Kids Online, Video
Child safety in a digital age
Editor • 12 Nov 2015
Sign up for our newsletters