Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. Whatβs the trade-off?
ESET's analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including those targeting enterprises and governments
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victimβs machine
One of the biggest threats to watch out for on social media is fraud perpetrated by people who arenβt who they claim to be. Hereβs how to recognize them.
In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being
While far from all roles in security explicitly demand coding skills, itβs challenging to envision a career in this field that wouldnβt derive substantial advantages from at least a basic understanding of fundamental coding principles
Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?
Once youβve made it past the initial screening process and secured that all-important interview, itβs time to seal the deal. These 10 tips will put you on the right track.
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States
Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as βthe front page of the Internetβ?
The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured
Phishing emails are a weapon of choice for criminals intent on stealing peopleβs personal data and planting malware on their devices. The healing process does not end with antivirus scanning.
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites
If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend β but is it a true VPN service? The devil is in the details.
ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs
The AI race is on! Itβs easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what the hype is about. Heydays for cybercriminals!
DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event's venue due to a bomb threat
Unsurprisingly, artificial intelligence took the center stage at this year's edition of Black Hat, one of the world's largest gatherings of cybersecurity professionals
Listen as ESET's Director of Threat Research Jean-Ian Boutin unravels the tactics, techniques and procedures of MoustachedBouncer, an APT group taking aim at foreign embassies in Belarus
Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks⦠Sounds like the infamous Turla? Think again!
Gamers and cybersecurity professionals have something in common β the ever-terrible presence of hacking, scams, and data theft β but how and why would anyone want to target gamers?
Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?
With powerful AI, it doesnβt take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?