• Top 5 Influential Women in Computing

    Since its inception in 2015, the International Day of Women and Girls in Science has been a day to recognize, applaud and reflect on the achievements of women all around the world. Celebrated on …

  • A trip down memory lane for Facebook’s sweet 16

    Take yourself back to 2004. A time without iPhones. A time before anybody had ever heard of Lady Gaga. A time when we only had three Harry Potter films. Sixteen years ago, on February 4, 2004, Mark…

  • Emotet trojan frustrated by ESET protection

    Throughout 2019, the Emotet trojan gained increasing notoriety for spreading malicious emails, while also being blamed for helping to deliver ransomware like Ryuk.

  • Data Protection Day: Nurturing cyber privacy and security

    On January 28, 1981, the Council of Europe’s data protection convention, known as “Convention 108,” was opened to signature. Convention 108, which continues to be updated as the digital world evolves,…

  • we live security image

    3 ways to browse the web anonymously

    As concern about internet privacy grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although,…

  • Mitreblog

    Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

    As the wealth of cybercrime intelligence published by cybersecurity researchers increases every year, there is a parallel risk that this can become potentially unmanageable for IT administrators who…