How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with. Governments create legislation and regulations primarily to protect public interests and keep order, ensuring society functions as it should. When related to cyber insurance … More How regulatory standards and cyber insurance inform each other

Be careful what you pwish for – Phishing in PWA applications

ESET analysts dissect a novel phishing method tailored to Android and iOS users. In this blogpost we discuss an uncommon type of phishing campaign targeting mobile users and analyze a case that we observed in the wild that targeted clients of a prominent Czech bank. This technique is noteworthy because it installs a phishing application … More Be careful what you pwish for – Phishing in PWA applications

Finding Balance: Nurturing Independence While Ensuring Safety

As parents, we all want to see our children thrive and become independent, especially in their use of the digital world. However, as we encourage freedom and self-reliance, we often find ourselves grappling with the constant worry about their safety. In this blog, we will be joined by child psychologist Jarmila Tomkova to explore the … More Finding Balance: Nurturing Independence While Ensuring Safety

The great location leak: Privacy risks in dating apps

What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance? In today’s digital age, geolocation features in many apps offer undeniable convenience. Just before writing this blog, I needed to locate some materials for a DIY project, and using the ‘click and collect’ … More The great location leak: Privacy risks in dating apps