Why you should ensure that all those apps on your smartphone only run with the permissions they reasonably need to do their job. Friends mention exciting new apps or we see a promotion that requires an app to be downloaded, and the rush is on to download the app and start interacting with it. But … More Do apps need all the permissions?
October is upon us, reminding us to make choices every day that will scare cybersecurity threats away. For many, October is a month of ghosts and ghouls, witches and wizards, pirates and pumpkins. After all, it culminates in the scariest day of the year – Halloween. However, it’s time not only to prepare for all … More Cyber Security Awareness Month started!
Complexity, capacity and security can all be addressed by MSPs – let’s talk priorities and challenges. MSPs, while providing for the business needs of multiple sectors, must also balance efficient management of cybersecurity processes to protect their clients. Achieving this via improved access and management, as well as improvement in both infrastructure and process, is … More No-cost ESET plugins for MSPs streamline security via low-effort dashboard
There is no word on which threat actor is abusing the severe vulnerability for attacks. Microsoft is urging Windows users to install an emergency security patch to address a critical vulnerability that affects multiple versions of Internet Explorer (IE) and is under active exploitation by unspecified bad actors. The company’s advisory notes that the zero-day, listed as CVE-2019-1367, is … More Microsoft rushes out patch for Internet Explorer zero‑day
Many companies are ranking cybersecurity as a top 5 priority but their actions do not measure up to the claim, a survey finds. The hard truth that companies must face is that there is no way that cybersecurity risk can be fully eliminated. On the other hand, there are steps that organizations can take to … More Do companies take cybersecurity seriously enough?
ESET researchers describe the latest components used in a recent Sednit campaign. While summer is usually synonymous with vacations, it seems that the Sednit group has been developing new components to add to the Zebrocy malware family. The Sednit group – also known as APT28, Fancy Bear, Sofacy or STRONTIUM – has been operating since … More No summer vacations for Zebrocy
ESET, a global leader in cybersecurity, has been described as a top performer in the KuppingerCole ESET Executive View report. The report analysed ESET Endpoint Security and outlines the strengths and robust anti-malware capabilities of the software. KuppingerCole Analysts is an international and independent analyst organization that supports companies, corporate users, integrators and software manufacturers in … More KuppingerCole Analysts Executive Report names ESET a top performer