Award-winning news, views, and insight from the ESET security community
James Shepperd • 29 Jun 2022 • 8 min. read
COVID-19, Business Security
Do back offices mean backdoors?
Cybercrime
5 common ways hackers steal credit card details
Privacy
Crypto mixers: What are they and how are they used?
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
James Shepperd • 29 Jun 2022
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe
Phil Muncaster • 27 Jun 2022
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
Sol González • 20 Jun 2022
Malware
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
Rene Holt • 16 Jun 2022
Digital Security
RSA – APIs, your organization’s dedicated backdoors
API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly
Cameron Camp • 10 Jun 2022
RSA – Creepy real-world edition
Digital fiddling somehow got mixed up in a real war
Cameron Camp • 09 Jun 2022
RSA – Digital healthcare meets security, but does it really want to?
Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission
Cameron Camp • 08 Jun 2022
RSA – Spot the real fake
How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
Cameron Camp • 07 Jun 2022
Kids Online
Talking to children about the internet: A kid’s perspective
A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet
André Lameiras • 01 Jun 2022