Cryptojacking, the result of “cryptocurrency rush” and how ESET can help

The rise in value of some digital currencies has led to a kind of “cryptocurrency rush” in which the mining is carried out not only by individuals trying to earn money legitimately, but also by cybercriminals who are developing threats and instigating attacks to hijack digital currencies, or otherwise to use computer resources owned by regular internet … More Cryptojacking, the result of “cryptocurrency rush” and how ESET can help

The rise of AI needs to be controlled, report warns

Much ink, digital and otherwise, has been spilled on the vast range of extraordinary opportunities enabled by artificial intelligence (AI) and machine learning (ML). Now, a team of 26 AI experts, including from Oxford, Cambridge and Yale universities, OpenAI, and the Electronic Frontier Foundation, has zeroed in on how AI could be misused for nefarious ends – … More The rise of AI needs to be controlled, report warns

How to start analyzing the security of your IoT devices

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices

Researchers unveil Veil to make ‘private browsing more private’

Researchers claim to have devised a way of browsing the web that “patches security holes left open by web browsers’ private-browsing functions”, reads the press announcement by the Massachusetts Institute of Technology (MIT). The newly-proposed method, aptly called ‘Veil’, may thus be of interest for web users who wish not to leave any trace of their browsing … More Researchers unveil Veil to make ‘private browsing more private’

Cryptocurrency scams on Android: do you know what to watch out for?

The growing prices and popularity of cryptocurrencies don’t just attract masses of potential users, but also inspire cyber-crooks to find new and creative ways to get their sticky fingers on all those virtual coins. Of course, cryptocurrency scams are not exclusive to PCs and have already emerged on the Android platform, using a wide array … More Cryptocurrency scams on Android: do you know what to watch out for?