Latest Articles

Kids Online

How to set up parental controls on your child’s new smartphone

How to set up parental controls on your child’s new smartphone

Kids Online

How to set up parental controls on your child’s new smartphone

Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls

André Lameiras19 Dec 2022


Video

MirrorFace aims for high-value targets in Japan – Week in security with Tony Anscombe

MirrorFace aims for high-value targets in Japan – Week in security with Tony Anscombe

Video

MirrorFace aims for high-value targets in Japan – Week in security with Tony Anscombe

The group's proprietary backdoor LODEINFO delivers additional malware, exfiltrates credentials, and steals documents and emails

Editor16 Dec 2022


Kids Online

Help! My kid has asked Santa for a smartphone

Help! My kid has asked Santa for a smartphone

Kids Online

Help! My kid has asked Santa for a smartphone

The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them use their new gadget safely and responsibly.

André Lameiras16 Dec 2022


Digital Security

Traveling for the holidays? Stay cyber-safe with these tips

Traveling for the holidays? Stay cyber-safe with these tips

Digital Security

Traveling for the holidays? Stay cyber-safe with these tips

Holiday travel is back with a vengeance this year. Set yourself up for a cyber-safe and hassle-free trip with our checklist.

Editor15 Dec 2022


ESET Research

Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities

Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities

ESET Research

Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities

ESET researchers discovered a spearphishing campaign targeting Japanese political entities a few weeks before the House of Councillors elections, and in the process uncovered a previously undescribed MirrorFace credential stealer

Dominik Breitenbacher14 Dec 2022


Digital Security

Top tips for security- and privacy-enhancing holiday gifts

Top tips for security- and privacy-enhancing holiday gifts

Digital Security

Top tips for security- and privacy-enhancing holiday gifts

Think outside the (gift) box. Here are a few ideas for security and privacy gifts to get for your relatives – or even for yourself. Some don’t cost a penny!

Phil Muncaster13 Dec 2022


We Live Progress, Business Security

Cybersecurity Trends 2023: Securing our hybrid lives

Cybersecurity Trends 2023: Securing our hybrid lives

We Live Progress, Business Security

Cybersecurity Trends 2023: Securing our hybrid lives

ESET experts offer their reflections on what the continued blurring of boundaries between different spheres of life means for our human and social experience – and especially our cybersecurity and privacy

Editor12 Dec 2022


Video

Diamond industry under attack – Week in security with Tony Anscombe

Diamond industry under attack – Week in security with Tony Anscombe

Video

Diamond industry under attack – Week in security with Tony Anscombe

ESET researchers uncover a new wiper and its execution tool, both attributed to the Iran-aligned Agrius APT group

Editor09 Dec 2022


Video

Xenomorph: What to know about this Android banking trojan

Xenomorph: What to know about this Android banking trojan

Video

Xenomorph: What to know about this Android banking trojan

Xenomorph pilfers victims' login credentials for banking, payment, social media, cryptocurrency and other apps with valuable data

Editor09 Dec 2022


ESET Research

Fantasy – a new Agrius wiper deployed through a supply-chain attack

Fantasy – a new Agrius wiper deployed through a supply-chain attack

ESET Research

Fantasy – a new Agrius wiper deployed through a supply-chain attack

ESET researchers analyzed a supply-chain attack abusing an Israeli software developer to deploy Fantasy, Agrius’s new wiper, with victims including the diamond industry

Adam Burgher07 Dec 2022


Digital Security

Tractors vs. threat actors: How to hack a farm

Tractors vs. threat actors: How to hack a farm

Digital Security

Tractors vs. threat actors: How to hack a farm

Forget pests for a minute. Modern farms also face another – and more insidious – breed of threat.

Jake Moore05 Dec 2022


Video

ScarCruft updates its toolset – Week in security with Tony Anscombe

ScarCruft updates its toolset – Week in security with Tony Anscombe

Video

ScarCruft updates its toolset – Week in security with Tony Anscombe

Deployed against carefully selected targets, the new backdoor combs through the drives of compromised systems for files of interest before exfiltrating them to Google Drive

Editor02 Dec 2022


Apt Activity Report
MDR Protection