Category: welivesecurity

David Harley
09
Apr
2025

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity. 10…

Kyle Ellison
09
Apr
2025

Hackers phish for data in Apple Watch scam

Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers…

Aryeh Goretsky
09
Apr
2025

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating…

Camilo Gutiérrez Amaya
09
Apr
2025

7 tasks that waste your IT team’s time

IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things…

How regulatory standards and cyber insurance inform each other
28
Mar
2025

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some…

Editor
28
Mar
2025

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security 23 Aug…

Exploring Android threats and ways to mitigate them
28
Mar
2025

Exploring Android threats and ways to mitigate them

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it…

The risks of unsupported IoT tech
28
Mar
2025

The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors 27 Aug 2024  •  ,…

Editor
28
Mar
2025

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become 28…

Malicious ads hiding in search results
28
Mar
2025

Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad 03 Sep 2024  •  , 3 min….

The key considerations for cyber insurance: A pragmatic approach
28
Mar
2025

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the…

ESET Research Podcast: HotPage
28
Mar
2025

ESET Research Podcast: HotPage

ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver 05 Sep 2024  • …