Latest Articles

How To

Webcam hacking: How to know if someone may be spying on you through your webcam

Webcam hacking: How to know if someone may be spying on you through your webcam

How To

Webcam hacking: How to know if someone may be spying on you through your webcam

Camfecting doesn’t ‘just’ invade your privacy – it could seriously impact your mental health and wellbeing. Here’s how to keep an eye on your laptop camera.

Phil Muncaster25 Apr 2022


Video

Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

Video

Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

As the Five Eyes nations warn of attacks against critical infrastructure, we look at the potentially cascading effects of such attacks and how essential systems and services can ramp up their defense

Editor22 Apr 2022


Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

Critical infrastructure: Under cyberattack for longer than you might think

Critical infrastructure: Under cyberattack for longer than you might think

Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

Critical infrastructure: Under cyberattack for longer than you might think

Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services

André Lameiras21 Apr 2022


Video

Is your Lenovo laptop vulnerable to cyberattack?

Is your Lenovo laptop vulnerable to cyberattack?

Video

Is your Lenovo laptop vulnerable to cyberattack?

Here’s what to know about vulnerabilities in more than 100 Lenovo consumer laptop models and what you can do right away to stay safe – all in under three minutes

Tony Anscombe20 Apr 2022


ESET Research

When "secure" isn't secure at all: High-impact UEFI vulnerabilities discovered in Lenovo consumer laptops

When "secure" isn't secure at all: High-impact UEFI vulnerabilities discovered in Lenovo consumer laptops

ESET Research

When "secure" isn't secure at all: High-impact UEFI vulnerabilities discovered in Lenovo consumer laptops

ESET researchers discover multiple vulnerabilities in various Lenovo laptop models that allow an attacker with admin privileges to expose the user to firmware-level malware

Martin Smolár19 Apr 2022


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Ukrainian energy provider targeted by Industroyer2 – ESET helps disrupt Zloader botnets – Where do new ideas come from and how are they spread?

Editor14 Apr 2022


ESET Research

ESET takes part in global operation to disrupt Zloader botnets

ESET takes part in global operation to disrupt Zloader botnets

ESET Research

ESET takes part in global operation to disrupt Zloader botnets

ESET researchers provided technical analysis, statistical information, and known command and control server domain names and IP addresses

Jean-Ian Boutin and Tomáš Procházka13 Apr 2022


ESET Research, Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

Industroyer2: Industroyer reloaded

Industroyer2: Industroyer reloaded

ESET Research, Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center

Industroyer2: Industroyer reloaded

This ICS-capable malware targets a Ukrainian energy company

ESET Research12 Apr 2022


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Fake e-shops & Android malware – A journey into the dark recesses of the world wide web – Keeping your cloud resources safe

Editor08 Apr 2022


Business Security

How secure is your cloud storage? Mitigating data security risks in the cloud

How secure is your cloud storage? Mitigating data security risks in the cloud

Business Security

How secure is your cloud storage? Mitigating data security risks in the cloud

As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice

Phil Muncaster07 Apr 2022


ESET Research

Fake e-shops on the prowl for banking credentials using Android malware

Fake e-shops on the prowl for banking credentials using Android malware

ESET Research

Fake e-shops on the prowl for banking credentials using Android malware

ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks

Lukas Stefanko06 Apr 2022


Cybercrime

We’re going on Tor

We’re going on Tor

Cybercrime

We’re going on Tor

If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser.

Jake Moore05 Apr 2022


Apt Activity Report
MDR Protection