Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-07-27 09:30:18 |
Cash App fraud: 10 common scams to watch out for (lien direct) |
>It pays to be careful – here's how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash
|
|
|
|
|
2022-07-25 09:30:25 |
NFT: A new‑fangled trend or also a new‑found treasure? (lien direct) |
I've created an NFT so you don't have to – here's the good, the bad and the intangible of the hot-ticket tokens
|
|
|
|
|
2022-07-22 16:15:27 |
macOS malware: myth vs. reality – Week in security with Tony Anscombe (lien direct) |
>ESET research shows yet again that macOS is not immune to malware – and why some users can benefit from Apple's Lockdown Mode
|
Malware
|
|
|
|
2022-07-20 09:30:12 |
ESET Research Podcast: Hot security topics at RSA or mostly hype? (lien direct) |
>Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron's insights into the security of medical devices
|
|
|
|
|
2022-07-19 09:30:44 |
I see what you did there: A look at the CloudMensis macOS spyware (lien direct) |
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
|
Malware
|
|
|
|
2022-07-15 14:39:37 |
Think twice before downloading pirated games – Week in security with Tony Anscombe (lien direct) |
Why downloading pirated video games may ultimately cost you dearly and how to stay safe while gaming online
|
|
|
|
|
2022-07-14 09:30:52 |
API security moves mainstream (lien direct) |
The heavyweights are now moving into API security, cementing it as “A Thing”
|
|
|
|
|
2022-07-13 09:30:36 |
Collaboration and knowledge sharing key to progress in cybersecurity (lien direct) |
>In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers
|
|
|
|
|
2022-07-12 09:30:27 |
Play it safe: 5 reasons not to download pirated games (lien direct) |
>It's all fun and games until you get hacked – and this is just one risk of downloading cracked games
|
|
|
|
|
2022-07-08 13:30:20 |
Avoid travel digital disasters – Week in security with Tony Anscombe (lien direct) |
>Vacations are a great time to unwind, but if you're not careful, you may face a digital disaster. Here's how to keep your devices and data secure while you're on the move
|
|
|
|
|
2022-07-08 09:30:22 |
Driving to France this summer? Watch out for scam websites before you go (lien direct) |
Scammers don't take the summer off – be on your guard when buying your Crit'Air sticker
|
|
|
|
|
2022-07-06 09:30:25 |
8 common Facebook Marketplace scams and how to avoid them (lien direct) |
>Here's what to watch out for when buying or selling stuff on the online marketplace and how to tell if you're being scammed
|
|
|
|
|
2022-07-04 09:30:59 |
Cyberattacks: A very real existential threat to organizations (lien direct) |
>One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?
|
Threat
|
|
|
|
2022-07-01 15:00:16 |
Watch out for survey scams – Week in security with Tony Anscombe (lien direct) |
>As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you're dealing with a scam?
|
|
|
|
|
2022-07-01 14:36:14 |
Phishing scam poses as Canadian tax agency before Canada Day (lien direct) |
The lead-up to the Canada Day festivities has brought a tax scam with it
|
Guideline
|
|
|
|
2022-06-30 09:30:50 |
Costco 40th anniversary scam targets WhatsApp users (lien direct) |
>If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that's because it is
|
|
|
|
|
2022-06-29 09:30:45 |
Do back offices mean backdoors? (lien direct) |
>War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
|
|
|
|
|
2022-06-27 09:30:34 |
5 ways cybercriminals steal credit card details (lien direct) |
>Here are some of the most common ways hackers can get hold of other people's credit card data – and how you can keep yours safe
|
|
|
|
|
2022-06-24 13:00:47 |
Instagram\'s new age verification tool – Week in security with Tony Anscombe (lien direct) |
>As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?
|
Tool
|
|
|
|
2022-06-23 09:30:33 |
Virtual private networks: 5 common questions about VPNs answered (lien direct) |
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
|
|
|
|
|
2022-06-21 09:30:07 |
Phishing awareness training: Help your employees avoid the hook (lien direct) |
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
|
|
|
|
|
2022-06-20 09:30:00 |
Crypto mixers: What are they and how are they used? (lien direct) |
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
|
|
|
|
|
2022-06-17 16:00:25 |
How to spot malicious spam – Week in security with Tony Anscombe (lien direct) |
>As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
|
Spam
|
|
|
|
2022-06-16 09:30:53 |
How Emotet is changing tactics in response to Microsoft\'s tightening of Office macro security (lien direct) |
>Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
|
Malware
|
|
|
|
2022-06-13 09:30:14 |
Industroyer: A cyber‑weapon that brought down a power grid (lien direct) |
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
|
Malware
|
|
|
|
2022-06-10 15:00:33 |
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe (lien direct) |
Here are three themes that stood out at the world's largest gathering of cybersecurity professionals
|
|
|
|
|
2022-06-10 14:30:01 |
RSA – APIs, your organization\'s dedicated backdoors (lien direct) |
API-based data transfer is so rapid, there's but little time to stop very bad things happening quickly
|
|
|
|
|
2022-06-09 17:00:21 |
RSA – Creepy real‑world edition (lien direct) |
Digital fiddling somehow got mixed up in a real war
|
|
|
|
|
2022-06-08 18:30:42 |
RSA – Digital healthcare meets security, but does it really want to? (lien direct) |
>Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations' primary mission
|
|
|
|
|
2022-06-07 19:00:02 |
RSA – Spot the real fake (lien direct) |
>How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
|
|
|
|
|
2022-06-07 09:30:01 |
Cybersecurity awareness training: What is it and what works best? (lien direct) |
>Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
|
|
|
|
|
2022-06-03 16:15:16 |
Key insights from ESET\'s latest Threat Report – Week in security with Tony Anscombe (lien direct) |
A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses
|
Threat
|
|
|
|
2022-06-03 16:00:45 |
100 days of war in Ukraine: How the conflict is playing out in cyberspace (lien direct) |
>It's been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict
|
|
|
|
|
2022-06-02 12:00:41 |
(Déjà vu) ESET Threat Report T 1 2022 (lien direct) |
>A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
|
|
2022-06-01 09:30:59 |
Talking to children about the internet: A kid\'s perspective (lien direct) |
>A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet
|
|
|
|
|
2022-05-30 09:30:02 |
Keeping it real: Don\'t fall for lies about the war (lien direct) |
>Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what's in the fake news
|
|
|
|
|
2022-05-27 13:30:42 |
Scams targeting NFT investors – Week in security with Tony Anscombe (lien direct) |
>As with everything digital, there's someone, somewhere devising a method to steal the assets away from their rightful owners
|
|
|
|
|
2022-05-27 09:30:05 |
Cybersecurity: A global problem that requires a global answer (lien direct) |
>New and exacerbated cyber-risks following Russia's invasion of Ukraine are fueling a new urgency towards enhancing resilience
|
|
|
|
|
2022-05-26 12:00:28 |
ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit (lien direct) |
>Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution
|
Threat
|
|
|
|
2022-05-25 09:30:41 |
5 reasons why GDPR was a milestone for data protection (lien direct) |
>The landmark regulation changed everyone's mindset on how companies worldwide collect and use the personal data of EU citizens
|
|
|
|
|
2022-05-23 09:30:26 |
Common NFT scams and how to avoid them (lien direct) |
>As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the industry.
|
|
|
|
|
2022-05-20 17:46:18 |
Cryptocurrency: secure or not? – Week in security with Tony Anscombe (lien direct) |
>When you hear the term 'cryptocurrency', does 'secure' also spring to mind? Here are some implications of the lack of sound security practices in the world of crypto.
|
|
|
|
|
2022-05-20 17:01:27 |
Sandworm uses a new version of ArguePatch to attack targets in Ukraine (lien direct) |
ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks
|
Malware
|
|
|
|
2022-05-19 09:30:53 |
The flip side of the coin: Why crypto is catnip for criminals (lien direct) |
>Cybercriminals continue to mine for opportunities in the crypto space – here's what you should know about coin-mining hacks and crypto theft
|
Hack
|
|
★★★
|
|
2022-05-18 09:30:18 |
Fake news – why do people believe it? (lien direct) |
>In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real
|
|
|
|
|
2022-05-16 09:30:03 |
The downside of \'debugging\' ransomware (lien direct) |
>The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code
|
Ransomware
|
|
|
|
2022-05-13 13:50:48 |
How to spot and avoid a phishing attack – Week in security with Tony Anscombe (lien direct) |
Can you spot the tell-tale signs of a phishing attempt and check if an email that has landed in your inbox is legit?
|
|
|
|
|
2022-05-12 09:30:30 |
10 reasons why we fall for scams (lien direct) |
The 'it won't happen to me' mindset leaves you unprepared – here are some common factors that put any of us at risk of online fraud
|
|
|
★★
|
|
2022-05-11 09:30:48 |
Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap (lien direct) |
What can organizations do to capitalize on the current fluidity in the job market and bring fresh cybersecurity talent into the fold?
|
|
|
★★
|
|
2022-05-09 09:30:42 |
Common LinkedIn scams: Beware of phishing attacks and fake job offers (lien direct) |
LinkedIn scammers attack when we may be at our most vulnerable – here's what to look out for and how to avoid falling victim to fraud when using the platform
|
|
|
★★
|