Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-04-20 13:00:25 |
How can we support young people in harnessing technology for progress? (lien direct) |
Young people are not passive victims of technology or helpless addicts. They are technology creators and agents with diverse backgrounds and interests.
|
|
|
|
|
2022-04-19 09:30:02 |
When “secure” isn\'t secure at all: High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops (lien direct) |
ESET researchers discover multiple vulnerabilities in various Lenovo laptop models that allow an attacker with admin privileges to expose the user to firmware-level malware
|
|
|
|
|
2022-04-13 16:00:11 |
ESET takes part in global operation to disrupt Zloader botnets (lien direct) |
ESET researchers provided technical analysis, statistical information, and known command and control server domain names and IP addresses
|
|
|
|
|
2022-04-12 09:28:16 |
Industroyer2: Industroyer reloaded (lien direct) |
This ICS-capable malware targets a Ukrainian energy company
|
Malware
|
|
|
|
2022-04-07 13:00:10 |
How secure is your cloud storage? Mitigating data security risks in the cloud (lien direct) |
As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice
|
|
|
|
|
2022-04-06 09:30:38 |
Fake e‑shops on the prowl for banking credentials using Android malware (lien direct) |
ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks
|
Malware
|
|
|
|
2022-04-05 09:30:03 |
We\'re going on Tor (lien direct) |
If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here's what it's like to surf the dark web using the browser.
|
|
|
|
|
2022-04-01 09:30:18 |
Cybersecurity survival tips for small businesses: 2022 edition (lien direct) |
How can businesses that lack the resources and technological expertise of large organizations hold the line against cybercriminals?
|
|
|
★★
|
|
2022-03-30 09:30:54 |
Women in tech: Unique insights from a lifelong pursuit of innovation (lien direct) |
Leading Slovak computer scientist Mária Bieliková shares her experience working as a woman driving technological innovation and reflects on how to inspire the next generation of talent in tech
|
Guideline
|
|
|
|
2022-03-29 09:30:36 |
Europe\'s quest for energy independence – and how cyber‑risks come into play (lien direct) |
Soaring energy prices and increased geopolitical tensions amid the Russian invasion of Ukraine bring a sharp focus on European energy security
|
|
|
|
|
2022-03-28 09:30:18 |
Under the hood of Wslink\'s multilayered virtual machine (lien direct) |
ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques
|
|
|
|
|
2022-03-24 16:00:12 |
Is a nation‑state digital deterrent scenario so far‑fetched? (lien direct) |
Why has the conflict in Ukraine not caused the much anticipated global cyber-meltdown?
|
|
|
|
|
2022-03-24 12:30:31 |
Crypto malware in patched wallets targeting Android and iOS devices (lien direct) |
ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets
|
Malware
|
|
|
|
2022-03-23 08:00:44 |
Mustang Panda\'s Hodur: Old tricks, new Korplug variant (lien direct) |
ESET researchers have discovered Hodur, a previously undocumented Korplug variant spread by Mustang Panda, that uses phishing lures referencing current events in Europe, including the invasion of Ukraine
|
|
|
|
|
2022-03-21 10:30:30 |
Sandworm: A tale of disruption told anew (lien direct) |
As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again
|
|
|
|
|
2022-03-18 10:30:49 |
Defending the data center: The time to act is now (lien direct) |
Cyberattacks against data centers may ultimately be everyone's problem – how prepared are their operators for the heightened risk of cyber-assaults?
|
|
|
|
|
2022-03-16 10:30:08 |
US military vs. Silicon Valley – a cultural divide (lien direct) |
The US military knows it needs to speed up technology adoption through optimization, something at the heart of Silicon Valley culture
|
|
|
|
|
2022-03-14 23:00:00 |
CaddyWiper: New wiper malware discovered in Ukraine (lien direct) |
This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations
|
Malware
|
|
|
|
2022-03-14 10:30:44 |
A first look at threat intelligence and threat hunting tools (lien direct) |
An overview of some of the most popular open-source tools for threat intelligence and threat hunting
|
Threat
|
|
|
|
2022-03-11 16:15:54 |
ESET Research webinar: How APT groups have turned Ukraine into a cyber‑battlefield (lien direct) |
Ukraine has been under cyber-fire for years now – here's what you should know about various disruptive cyberattacks that have hit the country since 2014
|
|
|
|
|
2022-03-10 17:00:15 |
True or false? How to spot – and stop – fake news (lien direct) |
How can you tell fact from fiction and avoid falling for and spreading falsehoods about the war in Ukraine?
|
|
|
|
|
2022-03-09 10:30:46 |
Securing healthcare: An IT health check on the state of the sector (lien direct) |
No sector or organization is immune to rapidly escalating cyberthreats, but when it comes to healthcare, the stakes couldn't be higher
|
|
|
|
|
2022-03-07 15:30:08 |
Cyber‑readiness in the face of an escalated gray zone conflict (lien direct) |
Organizations worldwide should remain on high alert for cyberattacks as the risk of major cyber-spillover from the crisis in Ukraine continues to loom large
|
|
|
|
|
2022-03-04 10:30:32 |
Emergency preparedness: How to disaster‑proof your tech (lien direct) |
Here are a few tips that will help you get your 'go bag' ready if you have to leave at a moment's notice and need your communications and data to survive
|
|
|
|
|
2022-03-03 10:30:15 |
ESET Research Podcast: Ukraine\'s past and present cyberwar (lien direct) |
Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country
|
Malware
|
|
|
|
2022-03-02 10:30:07 |
Innovation and the Roots of Progress (lien direct) |
If you look back at the long arc of history, it's clear that one of the most crucial drivers of real progress in society is innovation
|
|
|
|
|
2022-03-01 13:00:00 |
IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine (lien direct) |
ESET researchers uncover a new wiper that attacks Ukrainian organizations and a worm component that spreads HermeticWiper in local networks
|
|
|
|
|
2022-02-28 14:30:39 |
#ShieldsUp – Now is the time to double‑check cybersecurity processes and operations (lien direct) |
As the conflict in Ukraine heightens the risk of cyberattacks globally, what can organizations do to improve their resiliency?
|
|
|
|
|
2022-02-27 12:09:06 |
Beware of charity scams exploiting war in Ukraine (lien direct) |
Looking to help people in Ukraine? Donate wisely – do your research first so you give without getting scammed
|
|
|
|
|
2022-02-25 10:30:56 |
The past is present: Riffing on a cybersecurityappropriate tune for Black History Month (lien direct) |
What can social movements of the past teach you about the future – and about protecting your digital self?
|
|
|
|
|
2022-02-24 09:32:59 |
HermeticWiper: New data‑wiping malware hits Ukraine (lien direct) |
Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites
|
Malware
|
|
|
|
2022-02-23 10:30:33 |
Technology, Progress, and Climate (lien direct) |
The climate solutions we need to transform every sector are here. The question is: what role will you play in this transformation? You, your community, your business, your government?
|
|
|
|
|
2022-02-22 10:30:59 |
Teenage cybercrime: How to stop kids from taking the wrong path (lien direct) |
It's never too late to prevent children from being dragged to the dark side and to ensure their skills are a force for good
|
|
|
|
|
2022-02-21 10:30:19 |
Integer overflow: How does it occur and how can it be prevented? (lien direct) |
Make no mistake, counting on a computer is not as easy as it may seem. Here's what happens when a number gets “too big”.
|
|
|
|
|
2022-02-16 08:00:12 |
Folding the impossible into the reality of normal life (lien direct) |
Progress is a driving force of humanity, but what does that word “progress” really mean and what part do we have to play?
|
|
|
|
|
2022-02-15 10:30:45 |
Questions linger after IRS\'s about‑face on facial recognition (lien direct) |
Why would a tax agency contractor's privacy policy mention collecting information about my Facebook friends?
|
|
|
|
|
2022-02-14 10:30:45 |
From the back office to the till: Cybersecurity challenges facing global retailers (lien direct) |
How well retailers can manage the surge in cyberthreats may be crucial for their prospects in a post‑pandemic world
|
|
|
|
|
2022-02-11 10:30:45 |
When love hurts: Watch out for romance scams this Valentine\'s Day (lien direct) |
Don't be the next victim – spot the signs of a faux romance in time and send that scammer 'packing'
|
|
|
|
|
2022-02-10 10:30:50 |
Hidden in plain sight: How the dark web is spilling onto social media (lien direct) |
A trip into the dark corners of Telegram, which has become a magnet for criminals peddling everything from illegal drugs to fake money and COVID-19 vaccine passes
|
|
|
|
|
2022-02-09 10:30:07 |
ESET Threat Report T3 2021 (lien direct) |
A view of the T3 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
★★
|
|
2022-02-08 14:00:07 |
US: Your AI has to explain its decisions (lien direct) |
No more turning a blind eye to algorithmic bias and discrimination if US lawmakers get their way
|
|
|
|
|
2022-02-04 10:30:38 |
Think before you scan: How fraudsters can exploit QR codes to steal money (lien direct) |
QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares.
|
|
|
|
|
2022-02-02 10:30:55 |
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone (lien direct) |
Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them
|
|
|
|
|
2022-01-31 10:30:14 |
How to tell if your phone has been hacked (lien direct) |
Think your smartphone has been compromised by malware? Here's how to spot the signs of a hacked phone and how to remove the hacker from your phone.
|
|
|
|
|
2022-01-27 10:30:38 |
Beyond the tick box: What to consider before agreeing to a privacy policy (lien direct) |
The trade-off between using a free service and giving up our personal data becomes much less palatable when we think about the wider ramifications of the collection and use of our personal data
|
|
|
|
|
2022-01-26 11:50:33 |
Every breath you take, every move you make: Do fitness trackers pose privacy risks? (lien direct) |
Should you beware of wearables? Here's what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.
|
|
|
|
|
2022-01-25 10:30:37 |
Watering hole deploys new macOS malware, DazzleSpy, in Asia (lien direct) |
Hong Kong pro-democracy radio station website compromised to serve a Safari exploit that installed cyberespionage malware on site visitors' Macs
|
Malware
|
|
|
|
2022-01-24 10:30:46 |
How I hacked my friend\'s PayPal account (lien direct) |
Somebody could easily take control of your PayPal account and steal money from you if you're not careful – here's how to stay safe from a simple but effective attack
|
|
|
|
|
2022-01-20 10:30:09 |
How to know if your email has been hacked (lien direct) |
Think your email may have been hacked? Here are the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again
|
|
|
|
|
2022-01-18 10:30:52 |
DoNot Go! Do not respawn! (lien direct) |
ESET researchers take a deep look into recent attacks carried out by Donot Team throughout 2020 and 2021, targeting government and military entities in several South Asian countries
|
|
|
|