FBI investigating apparent ISIS attacks on Western websites
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator. 09 Mar 2015 • ,…
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator. 09 Mar 2015 • ,…
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware. Marc-Etienne M.Léveillé 09 Mar 2015 • , 1 min. read Last…
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity. 10 Mar 2015 • , 6…
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm…
One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating system at different times for…
IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things that waste your IT team’s…
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield…
Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security 23 Aug 2024 ESET researchers have recently…
The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your…
In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors 27 Aug 2024 • , 4 min. read Outdated devices…
The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become 28 Aug 2024 Recently, ESET Researchers…
Sometimes there’s more than just an enticing product offer hiding behind an ad 03 Sep 2024 • , 3 min. read One thing is true:…