Latest Articles

Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Telling state-backed hackers apart from cybercriminals – How to check if a website is safe – Gaming firms plagued by cyberattacks amid the pandemic

Editor25 Jun 2021


Cybercrime, Business Security

Gaming industry under siege from cyberattacks during pandemic

Gaming industry under siege from cyberattacks during pandemic

Cybercrime, Business Security

Gaming industry under siege from cyberattacks during pandemic

Cyberattacks targeting the gaming industry skyrocket, with web attacks more than tripling year-on-year in 2020

Amer Owaida24 Jun 2021


Privacy

Brave launches its own, privacy-focused search engine

Brave launches its own, privacy-focused search engine

Privacy

Brave launches its own, privacy-focused search engine

Brave's search engine takes on Google, promising to let users surf the web without leaving a trace

Amer Owaida23 Jun 2021


How To

How to tell if a website is safe

How to tell if a website is safe

How To

How to tell if a website is safe

It can be difficult to tell a legitimate website apart from an unsafe one – follow these steps to identify and protect yourself from bad websites

Amer Owaida23 Jun 2021


Business Security

State-sponsored or financially motivated: Is there any difference anymore?

State-sponsored or financially motivated: Is there any difference anymore?

Business Security

State-sponsored or financially motivated: Is there any difference anymore?

What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape?

Phil Muncaster21 Jun 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

5 steps to take to minimize damage from a ransomware attack – The double-edged sword of OSINT – Watch out for vishing scams

Editor18 Jun 2021


Ransomware

5 essential things to do before ransomware strikes

5 essential things to do before ransomware strikes

Ransomware

5 essential things to do before ransomware strikes

By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future

Cameron Camp18 Jun 2021


Privacy

Most health apps engage in unhealthy data-harvesting habits

Most health apps engage in unhealthy data-harvesting habits

Privacy

Most health apps engage in unhealthy data-harvesting habits

Most medical and fitness apps in Google Play have tracking capabilities enabled and their data collection practices aren’t transparent

Amer Owaida17 Jun 2021


Digital Security

OSINT 101: What is open source intelligence and how is it used?

OSINT 101: What is open source intelligence and how is it used?

Digital Security

OSINT 101: What is open source intelligence and how is it used?

OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers

Phil Muncaster16 Jun 2021


Cybercrime

Microsoft takes down large-scale BEC operation

Microsoft takes down large-scale BEC operation

Cybercrime

Microsoft takes down large-scale BEC operation

The fraudsters ran their campaigns from the cloud and used phishing attacks and email forwarding rules to steal financial information

Amer Owaida15 Jun 2021


How To

Vishing: What is it and how do I avoid getting scammed?

Vishing: What is it and how do I avoid getting scammed?

How To

Vishing: What is it and how do I avoid getting scammed?

How do vishing scams work, how do they impact businesses and individuals, and how can you protect yourself, your family and your business?

Phil Muncaster14 Jun 2021


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET Research dissects campaigns by the Gelsemium and BackdoorDiplomacy APT groups – Hacking an orbiting satellite isn't necessarily the stuff of Hollywood

Editor11 Jun 2021


Apt Activity Report
MDR Protection