ESET boosts its home security to protect your family against identity theft and ransomware

In a world where cybercriminals can abuse AI to create fake recordings of your face needed to bypass video-based authentication, or where phishing copycats of legitimate websites are almost unrecognisable from their real counterparts, and media repeatedly inform us about huge data breaches, it is no surprise that the general public is worried about what the future holds.  Even tech-savvy and vigilant home … More ESET boosts its home security to protect your family against identity theft and ransomware

Meta brings back face scanning to combat scams

Meta is testing new facial recognition tools on Facebook and Instagram to help users quickly restore compromised accounts and combat fake celebrity-endorsed scams. According to The Verge* these tools will verify a user’s identity by comparing their face to profile pictures on the platforms. The primary goal is to protect both celebrities and everyday users … More Meta brings back face scanning to combat scams

ESET bulks up its ESET HOME consumer protections against identity theft, ransomware, phishing, and more

ESET, a global leader in cybersecurity solutions, announced the launch of its upgraded consumer offering ESET HOME Security, introducing new features such as ESET Folder Guard and Multithread Scanning, together with an overall improvement of its capabilities. Identity Protection* featuring Dark Web Monitoring is now globally available.    These enhancements to ESET HOME Security, as an all-in-one solution … More ESET bulks up its ESET HOME consumer protections against identity theft, ransomware, phishing, and more

Internet Archive Breached Again

The Internet Archive confirmed a third security breach on October 20, 2024, marking a series of escalating cyberattacks According to Forbes*, hackers exploited unrotated Zendesk API tokens to access the platform managing support tickets. Despite earlier warnings and multiple breaches this month, the organization failed to secure the system adequately, leaving the tokens vulnerable. As … More Internet Archive Breached Again

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers. In our hyper-connected world, technology has transformed the way we communicate, enabling us to connect with anyone, anywhere, at the touch of a button. One of the most popular services to take advantage of … More Google Voice scams: What are they and how do I avoid them?