Controlling children’s use of technology: a preventive measure or an invasion of privacy?

How to use parental control apps to protect children and the fine line that exists between controlling the use of technology and invasion of privacy In the “Arkangel” episode of the popular series Black Mirror, an overprotective mother decides to implant a chip in her daughter’s brain so she can use her tablet and an app … More Controlling children’s use of technology: a preventive measure or an invasion of privacy?

Over 3,300 Android apps may be violating kids’ privacy, study says

Researchers find that a great portion of popular children’s apps may run afoul of US privacy legislation by improperly collecting data – albeit often probably unintentionally. A response from Google to the unflattering findings wasn’t long in coming. More than 3,300 children-oriented Android apps on Google Play are possibly gathering kids’ data in an improper … More Over 3,300 Android apps may be violating kids’ privacy, study says

Fake or not fake – that is the question

An interview with ESET’s Lukáš Štefanko on the thin line between what deserves the name “security app” and what can be called fake. ESET’s analysis of shady apps pretending to be security – or “antivirus” – apps that were discovered on Google Play left some questions unanswered. Lukáš Štefanko, who did the research, speaks about its wider … More Fake or not fake – that is the question

Pingu Cleans Up: Subscription scam on Google Play

The game was uploaded to Google Play and attempted to trick users into unwittingly signing up for a weekly paid subscription Android users should keep their eyes peeled for a curious scam technique discovered on Google Play – one going directly after their money and relying solely on user inattention. The app seen using the … More Pingu Cleans Up: Subscription scam on Google Play

Tricks that cybercriminals use, to hide in your phone

While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices. The convoluted tricks used to increase the effectiveness of their attacks can be grouped into two distinct categories: First, Social Engineering strategies that seek to … More Tricks that cybercriminals use, to hide in your phone

How to start analyzing the security of your IoT devices

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices

ESET to expose latest security and privacy risks of smart home devices at Mobile World Congress 2018

ESET, the leading IT security vendor based in the European Union, will launch its latest IoT security solutions and share groundbreaking research into the security and privacy implications of smart homes and devices at Mobile World Congress (MWC) – taking place February 26 – March 1, 2018 in Barcelona. Exhibiting in Hall 7, booth 7H41, … More ESET to expose latest security and privacy risks of smart home devices at Mobile World Congress 2018