Category: welivesecurity

Achieving cybersecurity compliance in 5 steps
24
Mar
2025

Achieving cybersecurity compliance in 5 steps

Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on…

Philip Torr: AI to the people | Starmus highlights
24
Mar
2025

Philip Torr: AI to the people | Starmus highlights

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the…

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks
24
Mar
2025

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of…

How cyber-secure is your business?
24
Mar
2025

How cyber-secure is your business?

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s…

Tony Anscombe
24
Mar
2025

Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? 12 Dec…

Why a CVSS score of 7.5 may be a 10 in your organization
24
Mar
2025

Why a CVSS score of 7.5 may be a 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific…

Hacking a car – or rather, its infotainment system
24
Mar
2025

Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy…

ESET Threat Report H2 2024
24
Mar
2025

ESET Threat Report H2 2024

ESET Research Threat Reports A view of the H2 2024 threat landscape as seen by ESET telemetry and from the…

ESET Threat Report H2 2024: Key findings
24
Mar
2025

ESET Threat Report H2 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure…

Protecting your business anytime, anywhere
24
Mar
2025

Protecting your business anytime, anywhere

While you’re enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your…

Unpacking Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)
24
Mar
2025

Unpacking Christmas scams | Unlocked 403 cybersecurity podcast (ep. 9)

ESET’s Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and…

ESET Research Podcast: Telekopye, again
24
Mar
2025

ESET Research Podcast: Telekopye, again

Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of ‘Neanderthals’…