2024 has been filled with many ups, downs ... and scams. As we navigate the treacherous waters of the digital realm, let’s take a moment and make note of the tactics behind the phishing emails that graced millions of inboxes across the...
A thoughtful friend gifted me a gimbal for my phone. A gimbal is a special handle with a gyroscopic motor that takes your mobile filming to the next…you know what, it’s not important.
How many times you’ve clicked the “I’m not a robot” CAPTCHA checkbox without a second thought? We’ve all done it … countless times. It’s such a familiar step that we don’t question it. And, cybercriminals have taken note of that. ...
Who wants a free phone or gift cards? Perhaps a free vacation? It’s easy to understand the allure of giveaways on social media. But here's the catch: not all giveaways are real. Fake giveaways are one of the many traps scammers use to...
The holiday season often brings the excitement of receiving or gifting the latest tech gadgets, from smartphones to laptops and internet-connected devices. The thrill of starting with a brand-new device, free from smudges and clutter, is...
Need to do some last-minute shopping for the holidays? Found a cool shop with great deals? Check it once, check it twice. Make sure you’re buying from a legitimate online store .
You might have heard of ransomware before—maybe even seen stories of people or businesses getting locked out of their own files unless they pay up. Well, brace yourself because ransomware attacks kept their momentum going from Q2 to...
Picture this: you download a harmless-looking app, maybe a phone cleaner or a new browser, only to find your screen bombarded by ads. Irritating, to say the least.
Oh, the holidays! A time for cheer, a time for joy, a time for ... a whole lot of shopping. As gift lists grow, shoppers are hitting the internet in search of the most popular items, hoping to score the perfect deal along the way.
Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules
The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity
Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.
You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online and even be the start of a predatory relationship
ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities
ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms
ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia
How do analyst relations professionals 'sort through the noise' and help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams
Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options