Latest Cybersecurity Articles

Device Protection

What is mobile spyware and how do I fight back?

What is mobile spyware and how do I fight back?

Device Protection

What is mobile spyware and how do I fight back?

Our mobile devices are the gateway to our digital lives. The price we pay for this convenience is that it makes our devices an attractive target for malicious actors.

Phil Muncaster15 Jul 2025


Endpoint Security and XDR

Security: Businesses need more. ESET moves from Essential to Advanced

Security: Businesses need more. ESET moves from Essential to Advanced

Endpoint Security and XDR

Security: Businesses need more. ESET moves from Essential to Advanced

With the evolution of threats, the definition of essential security is changing, and advanced tools are needed.

Roman Cuprik14 Jul 2025


Endpoint Security and XDR

Is your server protection up to par?

Is your server protection up to par?

Endpoint Security and XDR

Is your server protection up to par?

Security for local servers remains a critical aspect of an organization’s overall cybersecurity strategy.

Márk Szabó10 Jul 2025


Identity and Data Protection

Debunking five myths about business encryption

Debunking five myths about business encryption

Identity and Data Protection

Debunking five myths about business encryption

Let’s set the record straight and see why encryption is the cornerstone of company security.

Márk Szabó09 Jul 2025


Privacy and Identity Protection

Shining a light on the dark web

Shining a light on the dark web

Privacy and Identity Protection

Shining a light on the dark web

Ask many people about the dark web, and a concerned look might cross their faces. The implication is that it’s a lawless digital world populated solely by drug dealers and cybercriminals. But this couldn’t be further from the truth.

Editorial Team08 Jul 2025


Podcast

Why Is Your Data Worth So Much? | Cybersecurity Podcast

Why Is Your Data Worth So Much? | Cybersecurity Podcast

Podcast

Why Is Your Data Worth So Much? | Cybersecurity Podcast

In this episode of Unlocked 403, Becks sits down with Jake Moore, Global Security Advisor at ESET, to unpack how social media platforms harvest and monetize our data.

Alžbeta Kovaľová01 Jul 2025


Family Safety Online

Which online myths are your kids falling for? Learn how to recognize them

Which online myths are your kids falling for? Learn how to recognize them

Family Safety Online

Which online myths are your kids falling for? Learn how to recognize them

Today, with the rise of social media algorithms, viral challenges, and AI-generated content, it has become increasingly difficult to tell what’s real and what’s not.

James Shepperd01 Jul 2025


Prevention and Awareness

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Prevention and Awareness

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Despite rising challenges, SMEs worldwide are embracing new tools and support to grow stronger and more secure.

Ben Tudor27 Jun 2025


Cybersecurity Protection

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

Cybersecurity Protection

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

How a novel attack scenario spotted in Eastern Europe became a global threat.

Roman Cuprik27 Jun 2025


Threat landscape

Why genuine digital sovereignty requires European IT security

Why genuine digital sovereignty requires European IT security

Threat landscape

Why genuine digital sovereignty requires European IT security

As Europe is rocked by recent global developments, it should harness the talent of its capable citizens to secure Europe physically and digitally.

Márk Szabó and André Lameiras25 Jun 2025


Threat landscape

Webmail services are under a barrage of XSS attacks. What SMBs need to know

Webmail services are under a barrage of XSS attacks. What SMBs need to know

Threat landscape

Webmail services are under a barrage of XSS attacks. What SMBs need to know

XSS attacks are a prevalent threat but can be stopped at multiple stages, and businesses need only simple tools to do it.

Roman Cuprik20 Jun 2025


Privacy and Identity Protection

Incognito Mode: What it does, what it doesn’t do, and why it matters

Incognito Mode: What it does, what it doesn’t do, and why it matters

Privacy and Identity Protection

Incognito Mode: What it does, what it doesn’t do, and why it matters

Incognito mode is a useful tool but does not equal complete anonymity.

James Shepperd19 Jun 2025


Prevention first cybersecurity as a service
ESET Home Security