BLOG – ESET

Latest articles

blog_eset

Games, apps, websites… anything can be abused. How to protect your family from mobile threats

Smartphones have become an integral part of our social lives. From children to teens and on to adults and the elderly, globally, the average user now spends almost four hours daily staring at their mobile phone. There’s really no point in naming all the things people can use their mobile phones for. From social interaction to shopping, gaming, and so on… you know what they are capable of. […] Read More

blog_eset

ESET boosts its home security to protect your family against identity theft and ransomware

In a world where cybercriminals can abuse AI to create fake recordings of your face needed to bypass video-based authentication, or where phishing copycats of legitimate websites are almost unrecognizable from their real counterparts, and media repeatedly inform us about huge data breaches, it is no surprise that the general public is worried about what the future holds. […] Read More

blog_eset

ESET bulks up its ESET HOME consumer protections against identity theft, ransomware, phishing, and more

ESET, a global leader in cybersecurity solutions, today announced the launch of its upgraded consumer offering ESET HOME Security, introducing new features such as ESET Folder Guard and Multithread Scanning, together with an overall improvement of its capabilities. Identity Protection* featuring Dark Web Monitoring is now globally available. […] Read More

03_VAPM_thumb

Boosting cyber health: How vulnerability and patch management decrease threat exposure

The topic of vulnerabilities remains significant as new exploits emerge, underscoring the need for continuous vigilance and proactive defense strategies. In a world that records on average at least 7,240 new vulnerabilities per quarter (based on 2023 data), patching critical vulnerabilities should be an immediate priority; otherwise, users might face anything from exposing confidential data all the way to opening their entire networks to ransomware or wiperware. The possible negative scenarios are unlimited. […] Read More

blog_eset

ESET updates its Vulnerability and Patch Management module with new functions

ESET Vulnerability and Patch Management (V&PM) receives new updates, expanding its coverage and functionalities, ESET V&PM is now also available for Linux (desktop and server), and macOS systems The new V&PM dashboard inside ESET PROTECT grants extensive visibility and transparency, More control for security admins, with either always-on scanning or scanning on-demand […] Read More

02_alert_fatigue

Attention! Alert fatigue can result in severeburnout

Sometimes there is just so much work to do that we lose focus and begin to miss some crucial details, leading to a degradation in efficiency, performance, and output – resulting in a complete burnout. This is especially true for IT jobs, where burnout rates are high due to an insurmountable amount of tasks. In cybersecurity, alert fatigue is one major sign of burnout, which can enormously influence the state of a business's cybersecurity. Knowing about the symptoms and ways to ameliorate any possibility of it happening is paramount for the continuing well-being of your business and employees. […] Read More

hacktivism-state-backed-threat-actors

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat. Hacktivism surged back into mainstream consciousness with Russia’s invasion of Ukraine in February 2022. Less than two years later, politically-motivated groups and individuals were out in force again, this time ostensibly to make their point amid the Israel-Hamas conflict. […] Read More

bookingcom-scams

No room for error: Don’t get stung by these common Booking.com scams

From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation. Booking.com has become one of the main go-to platforms for travelers looking for holiday accommodation deals, but also for services like car rentals and airline tickets. In fact, it is the most visited travel and tourism website worldwide, having processed more than a billion bookings in 2023 […] Read More

WLS_virtual_kidnapping

Virtual kidnapping: How to see through this terrifying scam

Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims. It’s every parent’s worst nightmare. You get a call from an unknown number and on the other end of the line hear your child crying out for help. Then their ‘kidnapper’ comes on the line demanding a ransom or you will never see your son or daughter again. Unfortunately, this is not an imagined scenario from a Hollywood film […] Read More

data-backups-businesses

Better safe than sorry: 10 tips to build an effective business backup strategy

How backup best practices can help drive resilience and improve cyber-hygiene in your company Could your company survive if its most critical data stores were suddenly encrypted or wiped out by cybercriminals? This is the worst-case scenario many organizations have been plunged into as a result of ransomware. But there are also many other scenarios that could create serious business risk [...] Read More

time_is_money

Time is Money, and Online Game Scammers have lots of it

Source: ESET WeLiveSecurity Written by: Márk Szabó *Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?* One of the more worrying trends of the past few years within the gaming sphere has been the introduction […] Read More

Page 1 of 1