PRODUCT LAUNCHSimple antivirus is not enough anymore. ESET is introducing all-in-one protection for consumers
ESET AWARDSESET PROTECT Enterprise Earns Strategic Leader Recognition in AV-Comparatives EPR Test 2023
ESET ExpertJan 25Assessing and mitigating supply chain cybersecurity risksBlindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective...
ESET ExpertJan 22Virtual kidnapping: How to see through this terrifying scamPhone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims. It’s...
ESET ExpertJan 11Attack of the copycats: How fake messaging apps and app mods could bite youWhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride. Mobile...
ESET ExpertNov 28, 2023‘Tis the season to be wary: 12 steps to ruin a cybercriminal's dayThe holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with...
ESET ExpertOct 20, 2023CREDENTIAL STUFFING ATTACKS - Hacker leaks millions of genetic data profiles A hacker has leaked an additional 4.1 million stolen 23andMe genetic data profiles for people in Great Britain and Germany on a hacking...
ESET ExpertSep 8, 2023Staying ahead of threats: 5 cybercrime trends to watchNew reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought. Law...
ESET ExpertAug 25, 2023The grand theft of Jake Moore’s voice: The concept of a virtual kidnapWith powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some...
ESET ExpertAug 16, 2023DEF CON 31: Robot vacuums may be doing more than they claimWhen it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision. A presentation at DEF...
ESET ExpertJul 7, 2023Your data could be breached with Voice AuthenticationHelp Net Security recently reported that a computer scientist at the University of waterloo has discovered a method of attack that can...
ESET ExpertJul 4, 2023Deepfaking it: What to know about deepfake‑driven sextortion schemesCriminals increasingly create deepfake nudes from people’s benign public photos in order to extort money from them, the FBI warns. The...