Need to do some last-minute shopping for the holidays? Found a cool shop with great deals? Check it once, check it twice. Make sure you’re buying from a legitimate online store .
You might have heard of ransomware before—maybe even seen stories of people or businesses getting locked out of their own files unless they pay up. Well, brace yourself because ransomware attacks kept their momentum going from Q2 to...
Picture this: you download a harmless-looking app, maybe a phone cleaner or a new browser, only to find your screen bombarded by ads. Irritating, to say the least.
Oh, the holidays! A time for cheer, a time for joy, a time for ... a whole lot of shopping. As gift lists grow, shoppers are hitting the internet in search of the most popular items, hoping to score the perfect deal along the way.
Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules
Phishing is undoubtedly one of the most popular ways for cybercriminals to start a malicious attack, whether they're looking to steal someone’s identity or distribute malware. Since the emergence of phishing, this attack vector has only...
The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity
The holiday season is upon us, and with it comes the excitement of Black Friday and Cyber Monday. These annual shopping extravaganzas have transitioned from in-store chaos to virtual shopping sprees, offering consumers incredible deals...
Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories
Hollywood loves a good thriller—and so do many of us. From Fatal Attraction to You , stalking is a recurring theme that keeps viewers glued to their screens. One of the latest installments in this genre, Netflix’s Baby Reindeer , pulls...
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.
You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts
If you thought the surface web was the whole internet, think again. The dark web is where things get really strange—and sometimes dangerous. It's filled with underground websites that aren't indexed by search engines, and that’s where...
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year
Welcome, humans and ghouls! It’s your old pal, the Vault Keeper, sneaking into the Avast Security News Team’s office after hours to pull together five uncanny stories filled with deception and dread.
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online and even be the start of a predatory relationship
ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities
AI has been quite the hot topic this year. It’s no wonder there’s been a lot of discussion , not just about its futuristic potential, but about its impact on the elections.
ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms
ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia
How do analyst relations professionals 'sort through the noise' and help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams
Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options