Defending the data center: The time to act is now

Cyberattacks against data centers may ultimately be everyone’s problem – how prepared are their operators for the heightened risk of cyber-assaults? Why are data centers a prime target? Amid the pandemic and the rise of the remote worker, much attention in cybersecurity has shifted to the distributed workforce. The threats posed by an explosion in … More Defending the data center: The time to act is now

CaddyWiper: New wiper malware discovered in Ukraine

This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations. ESET researchers have uncovered yet another destructive data wiper that was used in attacks against organizations in Ukraine. Dubbed CaddyWiper by ESET analysts, the malware was first detected at 11.38 a.m. … More CaddyWiper: New wiper malware discovered in Ukraine

HermeticWiper: New data‑wiping malware hits Ukraine

Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites A number of organizations in Ukraine have been hit by a cyberattack that involved new data-wiping malware dubbed HermeticWiper and impacted hundreds of computers on their networks, ESET Research has found. The attack came just … More HermeticWiper: New data‑wiping malware hits Ukraine

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them. We live in an age of pervasive connectivity. But our always-on, mobile-centric lives also expose us to risk. For many people, it is the prospect of phishing, remotely deployed malware … More Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Beyond the tick box: What to consider before agreeing to a privacy policy

The trade-off between using a free service and giving up our personal data becomes much less palatable when we think about the wider ramifications of the collection and use of our personal data. The doorbell rings, you answer, and a representative of a large company is on the doorstep offering to allow you to use … More Beyond the tick box: What to consider before agreeing to a privacy policy