Márk Szabó, PR and Security Writer, ESET explains that recently, the YouTube channel stacksmashing uploaded a video on breaking the built-in encryption in Windows, essentially bypassing Windows Disk E...
Lucas Paus and Mario Micucci, the Security Researchers at ESET explain how to learn the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story t...
ESET researchers have identified 12 Android espionage apps that share the same malicious code; six were available on Google Play. All the observed applications were advertised as messaging tools, apar...
ESET announced today that it maintains its Champion status for the fifth consecutive year in the latest Cybersecurity Leadership Matrix from Canalys. With this milestone, it reaffirms its position as ...
Alžbeta Kovaľová, writer at ESET, discusses whether DNS protection technology can transform consumers’ worries about cybercrime with a trust-based approach.
Phil Muncaster, guest writer at ESET, says as we draw the curtain on another eventful year in cybersecurity, it’s time to review some of the high-profile cyber incidents that occurred in 2023.
ESET Research has discovered a cluster of malicious Python projects being distributed via PyPI, the official Python (programming language) package repository. The threat targets both Windows and Linux...
Phil Muncaster, a guest writer at ESET, explains that unwrapping a new gadget this holiday season will put a big smile on your face, but things may quickly turn sour if the device and data on it aren’...
ESET researchers have observed alarming growth in deceptive Android loan apps, which present themselves as legitimate personal loan services, promising quick and easy access to funds. Despite their at...