Category: welivesecurity

How regulatory standards and cyber insurance inform each other
28
Mar
2025

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some…

Editor
28
Mar
2025

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security 23 Aug…

Exploring Android threats and ways to mitigate them
28
Mar
2025

Exploring Android threats and ways to mitigate them

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it…

The risks of unsupported IoT tech
28
Mar
2025

The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors 27 Aug 2024  •  ,…

Editor
28
Mar
2025

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become 28…

Malicious ads hiding in search results
28
Mar
2025

Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad 03 Sep 2024  •  , 3 min….

The key considerations for cyber insurance: A pragmatic approach
28
Mar
2025

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the…

ESET Research Podcast: HotPage
28
Mar
2025

ESET Research Podcast: HotPage

ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver 05 Sep 2024  • …

Editor
28
Mar
2025

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as…

Phil Muncaster
28
Mar
2025

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for…

Editor
28
Mar
2025

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own…

AI security bubble already springing leaks
28
Mar
2025

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one 16…