The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become
In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors
The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure
Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security
Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with
ESET analysts dissect a novel phishing method tailored to Android and iOS users
Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme
Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data
Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance