We often teach children not to speak to strangers, but we seldom realize that we may actually be offering them up for exploitation by strangers on the internet every day.
The DNS, the address book of the internet, has long been plagued by malicious domains with little hope for effective recourse against this abuse by its bookkeepers: the registrars. ESET brings its…
With regard to technology, the term progress seems almost abstract; however, it becomes very real when we connect it to faces and people. Then, all of the sudden, certain people stand out, and they…
Our mobile phones are an undeniable part of our lives in the 21st century. We use them to contact our nearest and dearest, check the news, access the internet, make online purchases and even log into…
The potential of a zero-day vulnerability being exploited as a cyberweapon is, unfortunately, a real risk. Just like large enterprises, small businesses handle sensitive data and can become collateral…
In early 2021, ESET released ESET PROTECT, a new generation of our remote management tool enabling IT admins to securely deploy and manage ESET security products. Now, in 2022, ESET’s line of business…