Latest Articles

We Live Science

Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights

Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights

We Live Science

Chris Hadfield: The sky is falling – what to do about space junk? | Starmus Highlights

The first Canadian to walk in space dives deep into the origins of space debris, how it’s become a growing problem, and how we can clean up the orbital mess

Editor23 Dec 2024


ESET Research

ESET Research Podcast: Telekopye, again

ESET Research Podcast: Telekopye, again

ESET Research

ESET Research Podcast: Telekopye, again

Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of 'Neanderthals’ wield the Telekopye toolkit to ensnare unsuspecting victims they call 'Mammoths'

ESET Research20 Dec 2024


Video

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)

Video

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)

ESET's Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud

Editor19 Dec 2024


Business Security

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Business Security

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company's defenses are ready, no matter the time of year

Phil Muncaster18 Dec 2024


Video

ESET Threat Report H2 2024: Key findings

ESET Threat Report H2 2024: Key findings

Video

ESET Threat Report H2 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for staying secure in 2025

Editor16 Dec 2024


ESET Research, Threat Reports

ESET Threat Report H2 2024

ESET Threat Report H2 2024

ESET Research, Threat Reports

ESET Threat Report H2 2024

A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč16 Dec 2024


Privacy

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Privacy

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow

Tony Anscombe13 Dec 2024


Digital Security

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Digital Security

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems

Tony Anscombe13 Dec 2024


Digital Security

Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Digital Security

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

Tony Anscombe12 Dec 2024


Video, Business Security

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

Video, Business Security

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats?

Editor10 Dec 2024


Mobile Security

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Mobile Security

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost

Phil Muncaster09 Dec 2024


We Live Science

Philip Torr: AI to the people | Starmus Highlights

Philip Torr: AI to the people | Starmus Highlights

We Live Science

Philip Torr: AI to the people | Starmus Highlights

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact

Editor05 Dec 2024


Apt Activity Report
MDR Protection