The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure

Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security

Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with

ESET analysts dissect a novel phishing method tailored to Android and iOS users

Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme

Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data

Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance