ESET, a global leader in cybersecurity, is continuing to partner with Google to protect Google Chrome users. ESET’s award-winning technology is used by Google to scan, identify and remove unwanted software encountered by users of Chrome for Windows. The extension of the cooperation on Chrome Cleanup, part of Chrome’s Safe Browsing feature, continues the close … More Google Chrome and ESET collaborate in fight against online threats
ESET experts look back at some of the key themes that defined the cybersecurity landscape in the year that’s ending and give their takes on what to expect in 2021. 2020 has been a year like no other in living memory. It will go down in history for many things, but they all pale in … More Cybersecurity Trends 2021: Staying secure in uncertain times
The databases contain personal information that could be used for phishing attacks and identity theft schemes. Researchers have found close to 10.5 billion pieces of consumer data that has been left sitting in almost 10,000 unsecured internet-facing databases hosted across 20 countries. The data is said to include email addresses, passwords, and phone numbers. The study was … More 10 billion records exposed in unsecured databases, study says
Can a technological intervention stem the pandemic while avoiding the privacy pitfalls of location tracking? The UK Government recently announced that it was ceasing development of its current contact-tracing app; on the same day, the Canadian Government stated that it was developing one. All this in the same week that the Norwegian health authority had … More COVID‑19 contact tracing – technology panacea or privacy nightmare?
A new attack method enables bad actors to access data on a locked computer via an evil maid attack within 5 minutes. Millions of computers sporting Intel’s Thunderbolt ports are open to hands-on hacking attempts due to vulnerabilities in this hardware interface, according to research by Björn Ruytenberg, a security researcher at Eindhoven University of Technology … More Thunderbolt flaws open millions of PCs to physical hacking