Navigating privacy: Should we put the brakes on car tracking?

Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable? Tracking has recently become a big bogeyman. The sheer amount of data that an app or an operating system (OS) can use to identify you and collect your data is enormous, … More Navigating privacy: Should we put the brakes on car tracking?

Loan sharks use Android apps to reach new depths

Beware of predatory fin(tech): ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play This year, ESET researchers have observed alarming growth in deceptive Android loan apps, which present themselves as legitimate personal loan services, promising quick and easy access to funds. Despite their attractive appearance, … More Loan sharks use Android apps to reach new depths

Teaching appropriate use of AI tech

Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology. It has been reported recently that children are using artificial intelligence (AI) image generators to create indecent images of other children. The reports came amid a few publicized cases where several young people faced … More Teaching appropriate use of AI tech

Time is money. How the new ESET Professional Service Automation plugin makes the life of a Managed Service Provider easier

The ESET Professional Service Automation (PSA) plugin tracks license usage, creates billing adjustments, monitors dynamic groups from the ESET PROTECT Server, and automatically creates tickets within the PSA software. In the beginning, managed services sought to ease technical burdens on companies by passing them on to external providers who are experts in their respective fields. … More Time is money. How the new ESET Professional Service Automation plugin makes the life of a Managed Service Provider easier

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk. When it comes to corporate cybersecurity, leading by example matters. Yes, it’s important for every employee to play their part in a security-by-design culture. But their cues more often than not come from … More Executives behaving badly: 5 ways to manage the executive cyberthreat