The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges, as well as why he became involved with Starmus
We spoke to Michel Mayor about the importance of public engagement with science and how to foster responsibility among the youth for the preservation of our changing planet
Dr. Israelian talks about Starmus's vision and mission, the importance of inspiring and engaging audiences, and a sense of community within the Starmus universe
From promoting questionable content to posing security risks, inappropriate ads present multiple dangers for children. Hereβs how to help them stay safe.
Should childrenβs apps come with βwarning labelsβ? Here's how to make sure your children's digital playgrounds are safe places to play and learn.
Here's what drives cybercriminals to relentlessly target the personal information of other people β and why you need to guard your data like your life depends on it
Temu's cash giveaway where people were asked to hand over vast amounts of their personal data to the platform puts the spotlight on the data-slurping practices of online services today
Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result
Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Hereβs how to avoid being scammed when considering a loan.
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT
Given the unhealthy data-collection habits of some mHealth apps, youβre well advised to tread carefully when choosing with whom you share some of your most sensitive data
Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk
Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects
Here's how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals
Artificial intelligence is on everybodyβs lips these days, but there are also many misconceptions about what AI actually is and isnβt. We unpack AI's basics, applications and broader implications.
As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern
Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?
The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victimβs screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows
An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes
In todayβs digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike
Blindly trusting your partners and suppliers on their security posture is not sustainable β itβs time to take control through effective supplier risk management
As AI-powered voice cloning turbocharges imposter scams, we sit down with ESETβs Jake Moore to discuss how to hang up on βhi-fiβ scam calls β and what the future holds for deepfake detection
The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings
Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal
By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk