You know that malware is bad, but are you also aware of the various common ways in which it can infiltrate your devices? Malware has been one of the most common threats that netizens face daily. However, although you have heard about the various types of malware you can encounter, chances are you don’t know … More 7 ways malware can get into your device
While shopping for the perfect presents, be on the lookout for naughty cybercriminals trying to ruin your Christmas cheer by tricking you out of both gifts and money. In the words of the famous song, it’s beginning to look a lot like Christmas, and in the run-up to one of the most anticipated holidays of … More Cybersecurity Advent calendar: Tips for buying gifts and not receiving coal
ESET launched ESET Cloud Office Security, a new standalone software as a service solution that provides advanced preventative protection for users of Microsoft 365 applications. The software is designed to reflect the modern role of emails and collaboration tools used within organizations. Microsoft Office 365 is used by organizations all over the globe, with the cloud … More ESET launches ESET Cloud Office Security to provide advanced protection for Microsoft 365
The cyber attack affects 14 inboxes belonging to the Department of Justice was confirmed by ESET researchers. ESET’s team of malware researchers in Montreal, in collaboration with journalist Hugo Joncas, helped shed light on a cyber attack that affected the Quebec Department of Justice. Indeed, on August 11 and 12, the Department of Justice suffered a cyber attack in which malicious actors used malicious software to infect 14 inboxes under the Department‘s … More Emotet strikes Quebec’s Department of Justice: An ESET Analysis
What are exploit kits? Unwary internet users may not realize that in the course of normal browsing they can be exposed to malicious exploit kits that lurk on some websites. Exploit kits consist of malicious code to exploit one or more potential vulnerabilities in common web browsing and document viewing software. More sophisticated exploit kits … More Exploit kits: What are they and what is an exploit blocker?