ESET

How to stay secure on Twitter

Amer Owaida, security writer at ESET explains how to prevent your Twitter account from being hacked and to remain safe while tweeting

COVID increased the need for improved security of finances

ESET reveals that over two-thirds of business leaders (68%) expect their company’s investment in FinTech to increase in 2021/2022. This comes as 81% of senior managers surveyed agree that COVID-19 has...

Newly launched Apple M1 Macs target for cybercriminals

Amer Owaida, Security writer at ESET explains the disturbing trend that the first instance of malicious code native to Apple Silicon M1 Macs emerged a month after the release of devices equipped with ...

7 ways malware can infect your device

Amer Owaida, security writer at ESET explains that everyone knows that malware is bad, but are they also aware of the various common ways in which it can infiltrate your devices?

Cyber attackers can take full control of iPhone via WiFi

Amer Owaida, security writer at ESET explains that using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds

Security in uncertain times

Tomáš Foltýn, security writer at ESET looks back at some of the key themes that defined the cybersecurity landscape in the year that’s ending and give their takes on what to expect in 2021.

ESET releases the results of its global FinTech research

ESET has announced its global Financial Technology (FinTech) research, surveying over 10,000 consumers and senior business leaders. All the respondents were asked a series of questions on the topics o...

ESET achieves AV-TESET Top Product awards

ESET has been commended with Top Product awards in the latest AV-TEST Product Review and Certification reports in both the business and home consumer categories.

Hackers can trick scientists into producing dangerous substances

Amer Owaida, security writer at ESET sights a recent study describing “an end-to-end cyber-biological attack” explains that without ever setting foot in the lab, a threat actor could dupe ...

Lost Password

Please enter your username or email address. You will receive a link to create a new password via email.