A new attack method enables bad actors to access data on a locked computer via an evil maid attack within 5 minutes. Millions of computers sporting Intel’s Thunderbolt ports are open to hands-on hacking attempts due to vulnerabilities in this hardware interface, according to research by Björn Ruytenberg, a security researcher at Eindhoven University of Technology … More Thunderbolt flaws open millions of PCs to physical hacking
Eleven companies, ranging from online marketplaces to news websites, have had their user databases poached. More than 164 million user records stolen from almost a dozen companies have been put up for sale on the dark web in recent days. The data trove is being peddled by a cybercriminal collective going by the name Shiny … More Over 160 million user records put up for sale on the dark web
The pandemic has highlighted the need for businesses to act with alacrity and prepare for the long haul – and to do so with cybersecurity in mind. The technology industry abounds with buzzwords and phrases, with digital transformation being one such term that many companies aspire to undertake; but when faced with reality it can … More Digital transformation could be accelerated by COVID‑19
…and why are they selling it to other security vendors and product testers? If you were hoping to find a sensational story outing one of our competitors, I am going to disappoint you right away. This is not that, but it is something, something that can happen to all of us! Spam is something that … More Professional data leakage: How did that security vendor get my personal data?
If the coronavirus has you working from home for the next few weeks, don’t forget about cybersecurity best practices that can help defend against a cyberattack. Along with the coronavirus upsurge, new “opportunities” have blossomed for cybercriminals in at least two ways. First, the term “coronavirus” is reaching unprecedented levels of search volumes, meaning that malicious … More 5 tips for a cybersecure home office experience
There are a multitude of cybersecurity issues that enterprises must negotiate in the current digital landscape, including ransomware. Ransomware is a form of malicious code that blocks or encrypts the contents of a device and demands a ransom to restore access to the data. The devices in question include mobile phones and PCs but also extend to … More Advances in ESET ransomware protection
ESET Chief Security Evangelist Tony Anscombe sat down with us to share his insights on how to avoid falling prey to online fraud. Are you aware of some of the most common tactics that con artists can use to steal your data, identity and money? The digital era has opened new ways for scammers to … More Fraud Prevention Month: How to protect yourself from scams