Secret Service, ICE break the law over and over with fake cell tower spyingInvestigations 'at risk' from sloppy surveillance uncovered by audit probe The US Secret...
Day: March 4, 2023
Snap CISO: I rate software supply chain risk 9.9 out of 10
Snap CISO: I rate software supply chain risk 9.9 out of 10'Understanding your inventory is absolutely No. 1' he tells The Reg SCSW On a scale...
New cyberattack tactics rise up as ransomware payouts increase
New cyberattack tactics rise up as ransomware payouts increaseWhile phishing, business email compromise (BEC), and ransomware still rank among the most popular cyberattack techniques, a mix...
5 valuable skills your children can learn by playing video games
5 valuable skills your children can learn by playing video gamesGaming can help your children build and sharpen a range of life skills that will stand...
Mastodon vs. Twitter: Know the differences
Mastodon vs. Twitter: Know the differencesLooking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare...
Why your data is more valuable than you may realize
Why your data is more valuable than you may realizeThe data trail you leave behind whenever you're online is bigger – and more revealing – than...
SwiftSlicer: New destructive wiper malware strikes Ukraine
SwiftSlicer: New destructive wiper malware strikes UkraineSandworm continues to conduct attacks against carefully chosen targets in the war-torn country The post SwiftSlicer: New destructive wiper malware...
Are you in control of your personal data? – Week in security with Tony Anscombe
Are you in control of your personal data? – Week in security with Tony AnscombeData Privacy Week is a reminder to protect your data – all...
ESET APT Activity Report T3 2022
ESET APT Activity Report T3 2022An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post ESET...
Less is more: Conquer your digital clutter before it conquers you
Less is more: Conquer your digital clutter before it conquers youLose what you don’t use and other easy ways to limit your digital footprint and strengthen...
Are online surveys legit and safe? Watch out for survey scams
Are online surveys legit and safe? Watch out for survey scams“Can I tell a legitimate survey apart from a fake one?” is the single most important...
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony AnscombeAs our latest APT Activity Report makes abundantly clear, the threat of...
Online safety laws: What’s in store for children’s digital playgrounds?
Online safety laws: What’s in store for children’s digital playgrounds?As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push...
Into the void: Your tech and security in digital darkness
Into the void: Your tech and security in digital darknessNo internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications of...
ESET Threat Report T3 2022
ESET Threat Report T3 2022A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and...
Alexa, who else is listening?
Alexa, who else is listening?Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening? appeared first...
Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe
Key findings from the latest ESET Threat Report – Week in security with Tony AnscombeWhat is behind the drop in ransomware and what should still be...
Confident cybersecurity means fewer headaches for SMBs
Confident cybersecurity means fewer headaches for SMBsSmall and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts The post...
ChatGPT, will you be my Valentine?
ChatGPT, will you be my Valentine?Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot...
10 signs that scammers have you in their sights
10 signs that scammers have you in their sightsDon’t be their next victim – here’s a handy round-up of some the most common signs that should...
These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia
These aren’t the apps you’re looking for: fake installers targeting Southeast and East AsiaESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT...
Security amidst a global frost
Security amidst a global frostNo longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield The post Security...
Search ads abused to spread malware – Week in security with Tony Anscombe
Search ads abused to spread malware – Week in security with Tony AnscombeThreat actors used search engine ads to impersonate makers of popular software and direct...
Will ChatGPT start writing killer malware?
Will ChatGPT start writing killer malware?AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware? The...
ESET SMB Digital Security Sentiment Report: The damaging effects of a breach
ESET SMB Digital Security Sentiment Report: The damaging effects of a breachSMBs need to not only reduce their odds of being hit by an attack, but...
Writing like a boss with ChatGPT and how to get better at spotting phishing scams
Writing like a boss with ChatGPT and how to get better at spotting phishing scamsIt’s never been easier to write a convincing message that can trick...
WinorDLL64: A backdoor from the vast Lazarus arsenal?
WinorDLL64: A backdoor from the vast Lazarus arsenal?The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned...
A year of wiper attacks in Ukraine
A year of wiper attacks in UkraineESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine...
One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe
One year on, how is the war playing out in cyberspace? – Week in security with Tony AnscombeWith the conflict in Ukraine passing the one-year mark,...
ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022
ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022And that’s just the tip of the iceberg when it comes to the trends that...