Many of us at ESET are parents like you. We feel the need to guide our children through life and protect them from harm, but today the responsibility is a tremendous challenge. With increasingly complex mobile devices, new communication platforms and a quickly evolving online language, there’s a great deal for parents to learn in … More A safer internet for children – a parents’guide
The fraudsters ran their campaigns from the cloud and used phishing attacks and email forwarding rules to steal financial information. Microsoft has shut down a sprawling Business Email Compromise (BEC) operation that had its infrastructure hosted in several web services. Using these cloud-based assets, the threat actors infiltrated hundreds of mailboxes across multiple organizations and … More Microsoft takes down large‑scale BEC operation
In addition to patching the actively exploited bug, the update also brings fixes for another four security loopholes. Google has rolled out an update to its Chrome web browser that fixes five security flaws, including a vulnerability that is known to be actively exploited by attackers. “Google is aware of reports that an exploit for … More Google patches Chrome zero‑day under attack
Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online. As concern about internet privacy grows and grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although, in fact, “attempt … More 3 ways to browse the web anonymously
If you have had tech connectivity issues you may have heard the IT security team say, “that’s a firewall issue”, so what is a firewall and how does it work? As its name would suggest, the term originates from a structure that prevents the spread of a fire, such as emergency fire exits. In old … More Why do IT Security experts refer to firewalls?