Phishing is a way to steal your personal information, but how does it work exactly, and what do phishers do with your data once they’ve got it? Here we explore the types of phishing, how to identify…
Catfishing: when a person sets up a false profile on a social networking or dating website for abuse, deception or fraud. The goal tends to be either financial or material – however, catfishing…
Windows 7: an operating system now totally unsupported by Microsoft. So why does this make the OS so potentially dangerous? Here's everything you need to know about Windows 7, why it’s such a serious…
Mobile devices have long been viewed as safe from cybersecurity threats: but they too are now targets for both viruses and attacks. Here, we cover exactly antivirus & mobile security apps for Android…
Here, we go back to cybersecurity basics: covering exactly how computer viruses spread, the different types of computer viruses, how to detect them and finally, how an antivirus software can protect…
An in-depth look at what a Zero Trust security model entails and what organisations need to do to implement it, authored by Nicolás Raggi, ESET’s Security Intelligence Analyst.