Learning to recognize malware and its dirty tricks

The digital world knows many threats and malware can be one of the nastiest. To keep children, teenagers as well as adults safe, we will go over the most common types and forms of malicious code they can encounter and offer actionable tips. What is malware? Let’s start with the word malware. It is a blend of … More Learning to recognize malware and its dirty tricks

Protect the privacy of your children and cover their webcams

Laptops, smartphones and tablets – most of today’s smart devices come with a built-in camera. Thanks to technological advances, it doesn’t matter if your friend lives down the street or on the other side of the world, their webcam lets you have an (almost) face-to-face chat anytime. Video calls, selfies, vlogging, and the little lenses … More Protect the privacy of your children and cover their webcams

Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface. In May 2020, Björn Ruytenberg, a computer security researcher at the Eindhoven University of Technology in the Netherlands, announced the discovery of Thunderspy, a series of vulnerabilities in the Thunderbolt technology and interrelated scenarios for changing – including disabling – … More Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

How much is your personal data worth on the dark web?

The going prices are lower than you probably think – your credit card details, for example, can sell for a few bucks. It’s no news that the dark web is rife with offers of stolen data that ranges from pilfered credit card information and hijacked payment services accounts to hacked social media accounts. Anyone interested … More How much is your personal data worth on the dark web?

ESET discovers a chat app spying on users and leaking stolen data

ESET researchers have discovered a new operation within a long-running cyber-espionage campaign in the Middle East, apparently with links to the threat actor group known as Gaza Hackers, or Molerats. Instrumental in the operation is an Android app, Welcome Chat, which serves as spyware while also delivering the promised chatting functionality. The malicious website promoting … More ESET discovers a chat app spying on users and leaking stolen data