Two-factor authentication is an easy win for your online account security and here’s why.
Android banking malware uses overlay screen to steal credentials.
Internet of Things (IoT) and smart devices are all the rage, but what is the risk of buying and using a brand new smart product?
Excel Web Query (.IQY) files are being used to bypass some antivirus software and infect victims with a remote access trojan (RAT) malware.
We now live in a post-GDPR world. Make sure you aren’t caught afoul of the new regulation with these simple steps.
Tomáš Mičo, ESET Senior Data Protection and Licencing Lawyer, suggests five important points to focus on when considering your organisations GDPR compliance.