Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe
What is behind the drop in ransomware and what should still be done for containing the ransomware scourge? The post…
What is behind the drop in ransomware and what should still be done for containing the ransomware scourge? The post…
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat…
Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening?…
This is a current list of where and when I am scheduled to speak: I’m speaking at Mobile World Congress…
Cameras are getting smaller and smaller, changing the scale and scope of surveillance.
I had no idea—until I read this incredibly jargon-filled article: Squid is a cross-chain liquidity and messaging router that swaps…
“Pig butchering” is the colorful name given to online cons that trick the victim into giving money to the scammer,…
What will it take for policy makers to take cybersecurity seriously? Not minimal-change seriously. Not here-and-there seriously. But really seriously.…