-
Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks
Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost
-
Philip Torr: AI to the people | Starmus Highlights
We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact
-
This month in security with Tony Anscombe – November 2024 edition
Zero days under attack, a new advisory from ‘Five Eyes’, thousands of ICS units left exposed, and mandatory MFA for all – it’s a wrap on another month filled with impactful cybersecurity news
-
Bootkitty marks a new chapter in the evolution of UEFI threats
ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats
-
RomCom exploits Firefox and Windows zero days in the wild
ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit
-
Firefox and Windows zero days chained to deliver the RomCom backdoor
The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds
-
Kathryn Thornton: Correcting Hubble’s vision | Starmus Highlights
The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork made Hubble’s success possible
-
My information was stolen. Now what?
The slow and painful recovery process
-
ESET APT Activity Report Q2 2024–Q3 2024: Key findings
ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report
-
ESET Research Podcast: Gamaredon
ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation