You might be wondering what kids are up to on their smartphones these days. The answer is: everything. So we put together some trends to give you an idea of how your kids might be using their phones to interact, communicate, and—unfortunately—make trouble at school. 1. It’s all about Instagram, TikTok and YouTube For kids, … More Smartphone trends for schoolchildren
Spam is any form of unsolicited text, call or computer communication sent in bulk. Cybercriminals send spam via emails, IMs, text messages, and also phone calls and voicemails. Experiencing spam is not only distressing, but can pose a severe threat to the privacy of your personal data. ESET has put together a guide to what … More What is Spam? A Complete Guide
The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML. The arrival of the second Tuesday of the month can only mean one thing in cybersecurity terms, Microsoft is rolling out patches for security vulnerabilities in Windows and its other offerings. This time round Microsoft’s … More Microsoft Patch Tuesday fixes actively exploited zero‑day and 85 other flaws
The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks. While users already had the option to back up their message history using cloud-based services, they will soon be able to store their backups end-to-end encrypted (E2EE), WhatsApp has announced. The introduction of the new feature … More WhatsApp announces end‑to‑end encrypted backups
Discover the best ways to mitigate your organization’s attack surface, in order to maximize cybersecurity. In almost all coverage of modern breaches you’ll hear mention of the “cyberattack surface” or something similar. It’s central to understanding how attacks work and where organizations are most exposed. During the pandemic the attack surface has grown arguably further … More What is a cyberattack surface and how can you reduce it?