Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-08-09 09:30:28 |
How to check if your PC has been hacked, and what to do next (lien direct) |
>Has your PC been hacked? Whatever happens, don't panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.
|
|
|
★★★
|
|
2022-08-05 12:00:16 |
Develop a zero‑trust environment to protect your organization – Week in security with Tony Anscombe (lien direct) |
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.
|
|
|
|
|
2022-08-04 09:30:51 |
Don\'t get singed by scammers while you\'re carrying the torch for Tinder (lien direct) |
Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.
|
|
|
|
|
2022-08-02 09:30:31 |
Start as you mean to go on: the top 10 steps to securing your new computer (lien direct) |
>Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.
|
|
|
|
|
2022-07-29 17:45:39 |
Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe (lien direct) |
>Cybercriminals exploited a vulnerability to steal the equivalent of 18M$ from the NFT music streaming platform Audius, while other cyberthreats related to crypto makes the news.
|
Vulnerability
|
|
|
|
2022-07-29 09:30:53 |
Staying safe online: How to browse the web securely (lien direct) |
>Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.
|
|
|
|
|
2022-07-27 09:30:18 |
Cash App fraud: 10 common scams to watch out for (lien direct) |
>It pays to be careful – here's how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash
|
|
|
|
|
2022-07-25 09:30:25 |
NFT: A new‑fangled trend or also a new‑found treasure? (lien direct) |
I've created an NFT so you don't have to – here's the good, the bad and the intangible of the hot-ticket tokens
|
|
|
|
|
2022-07-22 16:15:27 |
macOS malware: myth vs. reality – Week in security with Tony Anscombe (lien direct) |
>ESET research shows yet again that macOS is not immune to malware – and why some users can benefit from Apple's Lockdown Mode
|
Malware
|
|
|
|
2022-07-20 09:30:12 |
ESET Research Podcast: Hot security topics at RSA or mostly hype? (lien direct) |
>Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron's insights into the security of medical devices
|
|
|
|
|
2022-07-19 09:30:44 |
I see what you did there: A look at the CloudMensis macOS spyware (lien direct) |
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
|
Malware
|
|
|
|
2022-07-15 14:39:37 |
Think twice before downloading pirated games – Week in security with Tony Anscombe (lien direct) |
Why downloading pirated video games may ultimately cost you dearly and how to stay safe while gaming online
|
|
|
|
|
2022-07-14 09:30:52 |
API security moves mainstream (lien direct) |
The heavyweights are now moving into API security, cementing it as “A Thing”
|
|
|
|
|
2022-07-13 09:30:36 |
Collaboration and knowledge sharing key to progress in cybersecurity (lien direct) |
>In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers
|
|
|
|
|
2022-07-12 09:30:27 |
Play it safe: 5 reasons not to download pirated games (lien direct) |
>It's all fun and games until you get hacked – and this is just one risk of downloading cracked games
|
|
|
|
|
2022-07-08 13:30:20 |
Avoid travel digital disasters – Week in security with Tony Anscombe (lien direct) |
>Vacations are a great time to unwind, but if you're not careful, you may face a digital disaster. Here's how to keep your devices and data secure while you're on the move
|
|
|
|
|
2022-07-08 09:30:22 |
Driving to France this summer? Watch out for scam websites before you go (lien direct) |
Scammers don't take the summer off – be on your guard when buying your Crit'Air sticker
|
|
|
|
|
2022-07-06 09:30:25 |
8 common Facebook Marketplace scams and how to avoid them (lien direct) |
>Here's what to watch out for when buying or selling stuff on the online marketplace and how to tell if you're being scammed
|
|
|
|
|
2022-07-04 09:30:59 |
Cyberattacks: A very real existential threat to organizations (lien direct) |
>One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?
|
Threat
|
|
|
|
2022-07-01 15:00:16 |
Watch out for survey scams – Week in security with Tony Anscombe (lien direct) |
>As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you're dealing with a scam?
|
|
|
|
|
2022-07-01 14:36:14 |
Phishing scam poses as Canadian tax agency before Canada Day (lien direct) |
The lead-up to the Canada Day festivities has brought a tax scam with it
|
Guideline
|
|
|
|
2022-06-30 09:30:50 |
Costco 40th anniversary scam targets WhatsApp users (lien direct) |
>If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that's because it is
|
|
|
|
|
2022-06-29 09:30:45 |
Do back offices mean backdoors? (lien direct) |
>War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
|
|
|
|
|
2022-06-27 09:30:34 |
5 ways cybercriminals steal credit card details (lien direct) |
>Here are some of the most common ways hackers can get hold of other people's credit card data – and how you can keep yours safe
|
|
|
|
|
2022-06-24 13:00:47 |
Instagram\'s new age verification tool – Week in security with Tony Anscombe (lien direct) |
>As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?
|
Tool
|
|
|
|
2022-06-23 09:30:33 |
Virtual private networks: 5 common questions about VPNs answered (lien direct) |
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
|
|
|
|
|
2022-06-21 09:30:07 |
Phishing awareness training: Help your employees avoid the hook (lien direct) |
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
|
|
|
|
|
2022-06-20 09:30:00 |
Crypto mixers: What are they and how are they used? (lien direct) |
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
|
|
|
|
|
2022-06-17 16:00:25 |
How to spot malicious spam – Week in security with Tony Anscombe (lien direct) |
>As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
|
Spam
|
|
|
|
2022-06-16 09:30:53 |
How Emotet is changing tactics in response to Microsoft\'s tightening of Office macro security (lien direct) |
>Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
|
Malware
|
|
|
|
2022-06-13 09:30:14 |
Industroyer: A cyber‑weapon that brought down a power grid (lien direct) |
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
|
Malware
|
|
|
|
2022-06-10 15:00:33 |
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe (lien direct) |
Here are three themes that stood out at the world's largest gathering of cybersecurity professionals
|
|
|
|
|
2022-06-10 14:30:01 |
RSA – APIs, your organization\'s dedicated backdoors (lien direct) |
API-based data transfer is so rapid, there's but little time to stop very bad things happening quickly
|
|
|
|
|
2022-06-09 17:00:21 |
RSA – Creepy real‑world edition (lien direct) |
Digital fiddling somehow got mixed up in a real war
|
|
|
|
|
2022-06-08 18:30:42 |
RSA – Digital healthcare meets security, but does it really want to? (lien direct) |
>Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations' primary mission
|
|
|
|
|
2022-06-07 19:00:02 |
RSA – Spot the real fake (lien direct) |
>How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
|
|
|
|
|
2022-06-07 09:30:01 |
Cybersecurity awareness training: What is it and what works best? (lien direct) |
>Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
|
|
|
|
|
2022-06-03 16:15:16 |
Key insights from ESET\'s latest Threat Report – Week in security with Tony Anscombe (lien direct) |
A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses
|
Threat
|
|
|
|
2022-06-03 16:00:45 |
100 days of war in Ukraine: How the conflict is playing out in cyberspace (lien direct) |
>It's been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict
|
|
|
|
|
2022-06-02 12:00:41 |
(Déjà vu) ESET Threat Report T 1 2022 (lien direct) |
>A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
|
|
2022-06-01 09:30:59 |
Talking to children about the internet: A kid\'s perspective (lien direct) |
>A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet
|
|
|
|
|
2022-05-30 09:30:02 |
Keeping it real: Don\'t fall for lies about the war (lien direct) |
>Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what's in the fake news
|
|
|
|
|
2022-05-27 13:30:42 |
Scams targeting NFT investors – Week in security with Tony Anscombe (lien direct) |
>As with everything digital, there's someone, somewhere devising a method to steal the assets away from their rightful owners
|
|
|
|
|
2022-05-27 09:30:05 |
Cybersecurity: A global problem that requires a global answer (lien direct) |
>New and exacerbated cyber-risks following Russia's invasion of Ukraine are fueling a new urgency towards enhancing resilience
|
|
|
|
|
2022-05-26 12:00:28 |
ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit (lien direct) |
>Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution
|
Threat
|
|
|
|
2022-05-25 09:30:41 |
5 reasons why GDPR was a milestone for data protection (lien direct) |
>The landmark regulation changed everyone's mindset on how companies worldwide collect and use the personal data of EU citizens
|
|
|
|
|
2022-05-23 09:30:26 |
Common NFT scams and how to avoid them (lien direct) |
>As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the industry.
|
|
|
|
|
2022-05-20 17:46:18 |
Cryptocurrency: secure or not? – Week in security with Tony Anscombe (lien direct) |
>When you hear the term 'cryptocurrency', does 'secure' also spring to mind? Here are some implications of the lack of sound security practices in the world of crypto.
|
|
|
|
|
2022-05-20 17:01:27 |
Sandworm uses a new version of ArguePatch to attack targets in Ukraine (lien direct) |
ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks
|
Malware
|
|
|
|
2022-05-19 09:30:53 |
The flip side of the coin: Why crypto is catnip for criminals (lien direct) |
>Cybercriminals continue to mine for opportunities in the crypto space – here's what you should know about coin-mining hacks and crypto theft
|
Hack
|
|
★★★
|