Latest Cybersecurity Articles

Family Safety Online

How to keep your child’s data safe and secure

How to keep your child’s data safe and secure

Family Safety Online

How to keep your child’s data safe and secure

Teach your child to protect their data, and explain the value of their online identity.

Roman Cuprik04 Dec 2025


Privacy and Identity Protection

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Privacy and Identity Protection

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Telegram may look like a secure messenger app, but when it comes to users at higher-risk and when there is confidential information involved, it has several serious security blind spots. This article breaks down how Telegram works, where its weak spots are, and which alternatives offer better security.

Editorial Team02 Dec 2025


Threat landscape

How to keep train security on track

How to keep train security on track

Threat landscape

How to keep train security on track

The arrival of threat actors on the railway scene may cause some lengthy delays and several late departures.

Márk Szabó01 Dec 2025


Device Protection

This shopping season will be different. Prepare for AI-powered scams targeting Android

This shopping season will be different. Prepare for AI-powered scams targeting Android

Device Protection

This shopping season will be different. Prepare for AI-powered scams targeting Android

Cybercriminals can utilize new AI-powered threats for Android before Christmas. Learn how to avoid them.

Roman Cuprik28 Nov 2025


What is

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

What is

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-factor authentication (2FA) adds a second layer of login security. Discover the best methods and how to enable them.

Phil Muncaster20 Nov 2025


Endpoint Security and XDR

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

Endpoint Security and XDR

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

AV-Comparatives Endpoint Prevention and Response (EPR) Comparative Report 2025 shows that the ESET PROTECT platform delivers on prevention and response.

James Shepperd19 Nov 2025


Privacy and Identity Protection

What to do if your Facebook account is hacked

What to do if your Facebook account is hacked

Privacy and Identity Protection

What to do if your Facebook account is hacked

How to secure and recover a hacked Facebook account with the minimum of stress.

Ben Tudor13 Nov 2025


MDR & Services

ETeC 2025: Living in the trenches with ESET MDR

ETeC 2025: Living in the trenches with ESET MDR

MDR & Services

ETeC 2025: Living in the trenches with ESET MDR

Join us for another “Story time with James” and hear more about what ESET MDR can see and do for you.

Márk Szabó12 Nov 2025


MDR & Services

European MDR: Now a major league of its own

European MDR: Now a major league of its own

MDR & Services

European MDR: Now a major league of its own

Five years after Schrems II collapsed the US-EU Privacy Shield agreement, the market for European Managed Detection and Response (MDR) is thriving.

Ben Tudor11 Nov 2025


Prevention and Awareness

How to secure aviation’s connected systems

How to secure aviation’s connected systems

Prevention and Awareness

How to secure aviation’s connected systems

In aviation, getting more connected might take on a dangerous dimension.

Márk Szabó06 Nov 2025


Family Safety Online

Digital hygiene for kids: How to build healthy screen habits and mindful tech use in 2025

Digital hygiene for kids: How to build healthy screen habits and mindful tech use in 2025

Family Safety Online

Digital hygiene for kids: How to build healthy screen habits and mindful tech use in 2025

Help your child build a healthy relationship with technology, not by banning screens, but by teaching balance, awareness, and mindful use.

Roman Cuprik05 Nov 2025


Cybersecurity Protection

AI for cybersecurity: How it keeps you safe online

AI for cybersecurity: How it keeps you safe online

Cybersecurity Protection

AI for cybersecurity: How it keeps you safe online

AI is taking over the world in ways many of us don’t even notice. That includes the cybersecurity space where the technology is already being built into products and services to keep us safe from threats.

Phil Muncaster04 Nov 2025


Prevention first cybersecurity as a service
ESET Home Security