Latest Articles

Internet of Things

Old devices, new dangers: The risks of unsupported IoT tech

Old devices, new dangers: The risks of unsupported IoT tech

Internet of Things

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors

Márk Szabó27 Aug 2024


Video, Mobile Security

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

Video, Mobile Security

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure

Editor26 Aug 2024


Video

PWA phishing on Android and iOS – Week in security with Tony Anscombe

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Video

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security

Editor23 Aug 2024


ESET Research

NGate Android malware relays NFC traffic to steal cash

NGate Android malware relays NFC traffic to steal cash

ESET Research

NGate Android malware relays NFC traffic to steal cash

Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM

Lukas Stefanko and Jakub Osmani22 Aug 2024


Business Security

How regulatory standards and cyber insurance inform each other

How regulatory standards and cyber insurance inform each other

Business Security

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with

Tony Anscombe21 Aug 2024


ESET Research

Be careful what you pwish for – Phishing in PWA applications

Be careful what you pwish for – Phishing in PWA applications

ESET Research

Be careful what you pwish for – Phishing in PWA applications

ESET analysts dissect a novel phishing method tailored to Android and iOS users

Jakub Osmani20 Aug 2024


Video

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

Video

How a BEC scam cost a company $60 million – Week in security with Tony Anscombe

Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme

Editor16 Aug 2024


Scams

Why scammers want your phone number

Why scammers want your phone number

Scams

Why scammers want your phone number

Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data

Márk Szabó13 Aug 2024


Privacy

The great location leak: Privacy risks in dating apps

The great location leak: Privacy risks in dating apps

Privacy

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance?

Tony Anscombe12 Aug 2024


Scams

Top 6 Craigslist scams: Don’t fall for these tricks

Top 6 Craigslist scams: Don’t fall for these tricks

Scams

Top 6 Craigslist scams: Don’t fall for these tricks

Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun

Phil Muncaster12 Aug 2024


Video

Black Hat USA 2024 recap – Week in security with Tony Anscombe

Black Hat USA 2024 recap – Week in security with Tony Anscombe

Video

Black Hat USA 2024 recap – Week in security with Tony Anscombe

Unsurprisingly, many discussions revolved around the implications of the CrowdStrike outage, including the lessons it may have offered for bad actors

Editor09 Aug 2024


Critical Infrastructure

Black Hat USA 2024: All eyes on election security

Black Hat USA 2024: All eyes on election security

Critical Infrastructure

Black Hat USA 2024: All eyes on election security

In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated

Tony Anscombe09 Aug 2024


Apt Activity Report
MDR Protection