Loan sharks use Android apps to reach new depths

Beware of predatory fin(tech): ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play This year, ESET researchers have observed alarming growth in deceptive Android loan apps, which present themselves as legitimate personal loan services, promising quick and easy access to funds. Despite their attractive appearance, … More Loan sharks use Android apps to reach new depths

Teaching appropriate use of AI tech

Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology. It has been reported recently that children are using artificial intelligence (AI) image generators to create indecent images of other children. The reports came amid a few publicized cases where several young people faced … More Teaching appropriate use of AI tech

Time is money. How the new ESET Professional Service Automation plugin makes the life of a Managed Service Provider easier

The ESET Professional Service Automation (PSA) plugin tracks license usage, creates billing adjustments, monitors dynamic groups from the ESET PROTECT Server, and automatically creates tickets within the PSA software. In the beginning, managed services sought to ease technical burdens on companies by passing them on to external providers who are experts in their respective fields. … More Time is money. How the new ESET Professional Service Automation plugin makes the life of a Managed Service Provider easier

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk. When it comes to corporate cybersecurity, leading by example matters. Yes, it’s important for every employee to play their part in a security-by-design culture. But their cues more often than not come from … More Executives behaving badly: 5 ways to manage the executive cyberthreat

New BLUFFS attack lets attackers hijack Bluetooth connections

Researchers at Eurecom have developed six new attacks collectively named ‘BLUFFS’ that can break the secrecy of Bluetooth sessions, allowing for device impersonation and man-in-the-middle (MitM) attacks, writes Bleeping Computer*. Daniele Antonioli, who discovered the attacks, explains that BLUFFS exploits two previously unknown flaws in the Bluetooth standard related to how session keys are derived … More New BLUFFS attack lets attackers hijack Bluetooth connections