Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication? The ability to confirm your identity using your fingerprint or face is something we have already become accustomed to. … More How does biometric authentication work?
ESET, a global leader in cybersecurity, announces its 2022 Heroes of Progress. The shortlist includes nine unsung agents of change from across the world who have contributed to technological progress across a variety of industries. The shortlist was curated following a rigorous process in which the heroes provided a comprehensive outline of their work and … More ESET announces its inaugural Heroes of Progress
Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device. Let’s be clear: if your iPhone or iPad is connected to the internet, there’s a risk it might get hacked. Sure, statistics seem … More Can your iPhone be hacked? What to know about iOS security
ESET researchers have discovered a Linux variant of the SideWalk backdoor, one of the multiple custom implants used by the SparklingGoblin APT group. This variant was first deployed against a Hong Kong university in February 2021 — the same university that had already been targeted by SparklingGoblin during the student protests in May 2020. SparklingGoblin … More ESET uncovers new Linux backdoor targeting a Hong Kong university