Silent but deadly: The rise of zero-click attacks
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
Results driven. Results delivered.
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past?
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi
Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods?
Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable?
ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play
Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology
Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk
The technology is both widely available and well developed, hence it’s also poised to proliferate – especially in the hands of those wishing ill