Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe
What is behind the drop in ransomware and what should still be done for containing the ransomware scourge? The post…
What is behind the drop in ransomware and what should still be done for containing the ransomware scourge? The post…
Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening?…
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat…
Cameras are getting smaller and smaller, changing the scale and scope of surveillance.
This is a current list of where and when I am scheduled to speak: I’m speaking at Mobile World Congress…
What will it take for policy makers to take cybersecurity seriously? Not minimal-change seriously. Not here-and-there seriously. But really seriously.…
“Pig butchering” is the colorful name given to online cons that trick the victim into giving money to the scammer,…
I had no idea—until I read this incredibly jargon-filled article: Squid is a cross-chain liquidity and messaging router that swaps…