The air is electric, the skies are clear, and the lineups are out – festival season is upon us! From the euphoric beats under starlit skies to the communal spirit of like-minded souls, festivals offer a world apart, a temporary escape...
In the ever-evolving landscape of the digital world, safeguarding your online presence has become more a necessity than a choice. However, when it comes to online safety, performance, and privacy, one size does not fit all. This is where...
Today’s most common crime is not burglary, car theft or even shoplifting - it’s online fraud . And this includes pitfalls such as emotional scamming. Not to mention, anyone with an internet connection (in other words, all your customers)...
Tax season is upon us, and you know what that means: It’s time for IRS scams to start showing up. These scams take the form of anything from phishing emails to fake phone calls — and they can be difficult to spot.
Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result
Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan.
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT
Financial scams are like that one guest at the party who just won't leave, constantly evolving and finding new ways to crash our digital lives. Lately, they've taken a turn for the futuristic with AI-generated videos popping up in...
Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data
We are excited to announce our new flexible billing option for our Managed Service Providers (MSPs) using the Multi-company partner version of our cloud management platform, the Avast Business Hub. This pay-as-you-go feature helps MSPs...
Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor
Have you ever gotten a call from the IRS? If you have, then you might be one of the thousands of people losing millions of dollars every year to IRS scam calls. These fraudulent calls, which claim to be from the Internal Revenue Service...
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk
PDFs have become synonymous with convenience and reliability, serving as the backbone for our document-sharing needs. Whether for work, school, or personal use, their ability to maintain formatting across various platforms has made them...
It's that time of year again – tax season – and, unfortunately, it's also a peak time for phishing scams . Cybercriminals know that people are more likely to be filing their taxes and sharing sensitive information online, so they...
In our fast-paced online world, small businesses face a real challenge when it comes to protecting employees’ web browsing. Without the right tools, enforcing internal policies to safeguard your company against cyberthreats and bolster...
Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects
You would never give your personal ID to random strangers, right? So why provide the ID of your computer? Unsuspecting users beware, IP grabbers do not ask for your permission.
Here's how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals
Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack AI's basics, applications and broader implications.
As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern
Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?
The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows
An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes
In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike
Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management
As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’ scam calls – and what the future holds for deepfake detection