BLOG – ESET
Latest articles
Games, apps, websites… anything can be abused. How to protect your family from mobile threats
Smartphones have become an integral part of our social lives. From children to teens and on to adults and the elderly, globally, the average user now spends almost four hours daily staring at their mobile phone. There’s really no point in naming all the things people can use their mobile phones for. From social interaction to shopping, gaming, and so on… you know what they are capable of. […] Read More
ESET boosts its home security to protect your family against identity theft and ransomware
In a world where cybercriminals can abuse AI to create fake recordings of your face needed to bypass video-based authentication, or where phishing copycats of legitimate websites are almost unrecognizable from their real counterparts, and media repeatedly inform us about huge data breaches, it is no surprise that the general public is worried about what the future holds. […] Read More
ESET bulks up its ESET HOME consumer protections against identity theft, ransomware, phishing, and more
ESET, a global leader in cybersecurity solutions, today announced the launch of its upgraded consumer offering ESET HOME Security, introducing new features such as ESET Folder Guard and Multithread Scanning, together with an overall improvement of its capabilities. Identity Protection* featuring Dark Web Monitoring is now globally available. […] Read More
Boosting cyber health: How vulnerability and patch management decrease threat exposure
The topic of vulnerabilities remains significant as new exploits emerge, underscoring the need for continuous vigilance and proactive defense strategies. In a world that records on average at least 7,240 new vulnerabilities per quarter (based on 2023 data), patching critical vulnerabilities should be an immediate priority; otherwise, users might face anything from exposing confidential data all the way to opening their entire networks to ransomware or wiperware. The possible negative scenarios are unlimited. […] Read More
ESET updates its Vulnerability and Patch Management module with new functions
ESET Vulnerability and Patch Management (V&PM) receives new updates, expanding its coverage and functionalities, ESET V&PM is now also available for Linux (desktop and server), and macOS systems The new V&PM dashboard inside ESET PROTECT grants extensive visibility and transparency, More control for security admins, with either always-on scanning or scanning on-demand […] Read More
Attention! Alert fatigue can result in severeburnout
Sometimes there is just so much work to do that we lose focus and begin to miss some crucial details, leading to a degradation in efficiency, performance, and output – resulting in a complete burnout. This is especially true for IT jobs, where burnout rates are high due to an insurmountable amount of tasks. In cybersecurity, alert fatigue is one major sign of burnout, which can enormously influence the state of a business's cybersecurity. Knowing about the symptoms and ways to ameliorate any possibility of it happening is paramount for the continuing well-being of your business and employees. […] Read More
Hacktivism is evolving – and that could be bad news for organizations everywhere
Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat. Hacktivism surged back into mainstream consciousness with Russia’s invasion of Ukraine in February 2022. Less than two years later, politically-motivated groups and individuals were out in force again, this time ostensibly to make their point amid the Israel-Hamas conflict. […] Read More
No room for error: Don’t get stung by these common Booking.com scams
From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation. Booking.com has become one of the main go-to platforms for travelers looking for holiday accommodation deals, but also for services like car rentals and airline tickets. In fact, it is the most visited travel and tourism website worldwide, having processed more than a billion bookings in 2023 […] Read More
Virtual kidnapping: How to see through this terrifying scam
Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims. It’s every parent’s worst nightmare. You get a call from an unknown number and on the other end of the line hear your child crying out for help. Then their ‘kidnapper’ comes on the line demanding a ransom or you will never see your son or daughter again. Unfortunately, this is not an imagined scenario from a Hollywood film […] Read More
Better safe than sorry: 10 tips to build an effective business backup strategy
How backup best practices can help drive resilience and improve cyber-hygiene in your company Could your company survive if its most critical data stores were suddenly encrypted or wiped out by cybercriminals? This is the worst-case scenario many organizations have been plunged into as a result of ransomware. But there are also many other scenarios that could create serious business risk [...] Read More
Time is Money, and Online Game Scammers have lots of it
Source: ESET WeLiveSecurity Written by: Márk Szabó *Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?* One of the more worrying trends of the past few years within the gaming sphere has been the introduction […] Read More