Award-winning news, views, and insight from the ESET security community
Internet of Things
Hacking baby monitors can be child’s play: Here’s how to stay safe
Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk
Phil Muncaster • 07 Nov 2022
8 questions to ask yourself before getting a home security camera
As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?
Phil Muncaster • 03 Oct 2022
Kids Online, Internet of Things
Toys behaving badly: How parents can protect their family from IoT threats
It pays to do some research before taking a leap into the world of internet-connected toys
Phil Muncaster • 08 Sep 2022
Malware
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
Rene Holt • 16 Jun 2022
Internet of Things, Privacy
Every breath you take, every move you make: Do fitness trackers pose privacy risks?
Should you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.
Phil Muncaster • 26 Jan 2022
Virus Bulletin: Old malware never dies – it just gets more targeted
Putting a precision payload on top of more generic malware makes perfect sense for malware operators
Cameron Camp • 15 Oct 2021
FBI removes web shells from compromised Exchange servers
Authorities step in to thwart attacks leveraging the recently-disclosed Microsoft Exchange Server vulnerabilities
Amer Owaida • 14 Apr 2021
Is your dishwasher trying to kill you?
Does every device in your home really need to be connected to the internet? And could your smart appliance be turned against you?
Jake Moore • 01 Apr 2021
Backdoor added to PHP source code in Git server breach
Had the incident gone unnoticed, the attackers could have taken over websites using the tainted code
Amer Owaida • 30 Mar 2021