Safeguard the joy: 10 tips for securing your shiny new device
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly
Results driven. Results delivered.
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly
How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET’s latest Threat Report
A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes
Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?
The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past?
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.