Category: welivesecurity

What is “Scam Likely”? Putting the phone down on unwanted calls
27
Mar
2025

What is “Scam Likely”? Putting the phone down on unwanted calls

Tired of dodging all those ‘Scam Likely’ calls? Here’s what’s behind the label and how to stay one step ahead…

My information was stolen. Now what?
27
Mar
2025

My information was stolen. Now what?

Back in May 2023, I wrote the blogpost You may not care where you download software from, but malware does…

Editor
27
Mar
2025

Kathryn Thornton: First Service Mission to the Hubble Space Telescope

The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork…

Editor
27
Mar
2025

Zero-click exploit abusing Firefox and Windows zero days

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds 26 Nov…

Editor
24
Mar
2025

A new chapter in UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance…

Scams to look out for this holiday season
24
Mar
2025

Scams to look out for this holiday season

As the mercury starts to dip and the Halloween decorations are cleared away, it can mean only one thing: the…

Editor
24
Mar
2025

Month in security with Tony Anscombe – November 2024 edition

Zero days under attack, a new advisory from ‘Five Eyes’, thousands of ICS units left exposed, and mandatory MFA for…

Richard Marko: Rethinking cybersecurity in the age of global challenges
24
Mar
2025

Richard Marko: Rethinking cybersecurity in the age of global challenges

ESET’s CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital…

Achieving cybersecurity compliance in 5 steps
24
Mar
2025

Achieving cybersecurity compliance in 5 steps

Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on…

Philip Torr: AI to the people | Starmus highlights
24
Mar
2025

Philip Torr: AI to the people | Starmus highlights

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the…

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks
24
Mar
2025

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of…

How cyber-secure is your business?
24
Mar
2025

How cyber-secure is your business?

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s…