Information

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Business Security Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging Phil Muncaster 03 Oct 2025  •  , 5 min. read Manufacturers face a unique mix of risk: they have an extremely low tolerance for downtime, they sit at the heart of extensive and often complex supply chains, and their competitive advantage is often built on high-value intellectual property (IP), including proprietary…

Read More

Beware of threats lurking in booby-trapped PDF files

Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money. Fabiana Ramírez Cuenca 06 Oct 2025  •  , 5 min. read PDF files have become a staple of our daily digital lives, both at work and at home. They work seamlessly across operating systems and devices, and they couldn’t be easier to create and share. Every day, countless PDF (Portable Document Format) files are…

Read More

The case for cybersecurity: Why successful businesses are built on protection

Business Security Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center Phil Muncaster 07 Oct 2025  •  , 5 min. read These are nervy times for many business leaders. Persistently high interest rates, geopolitical tensions, supply chain disruption and abrupt changes to trade policies have created a new climate of uncertainty. Against this backdrop, many could be forgiven for stalling investment and looking for…

Read More

Cybersecurity Awareness Month 2025: Passwords alone are not enough

Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders. 08 Oct 2025 October is Cybersecurity Awareness Month, a good time to pause and reflect on how you protect your digital world and your online accounts in particular. For many people, that’s still just a password. But here’s the rub: Passwords alone are not enough to stand up to…

Read More

How Uber seems to know where you are – even with restricted location permissions

Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way. Tony Anscombe 09 Oct 2025  •  , 3 min. read When you land at an airport, you may be greeted with a notification on your phone that reads: “Welcome to [your location] – Open the app to get directions to the Uber pick-up point.” For privacy-conscious users who only allow apps to access their location while…

Read More

AI-aided malvertising: Exploiting a chatbot to spread scams

Digital Security Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it. Phil Muncaster 13 Oct 2025  •  , 5 min. read We’ve all heard about the dangers posed by social engineering. It’s one of the oldest tricks in the hackers’ book: psychologically manipulate a victim into handing over their information or installing malware. Up until now, this has been done…

Read More

Drilling Down on Uncle Sam’s Proposed TP-Link Ban

The U.S. government is reportedly preparing to ban the sale of wireless routers and other networking gear from TP-Link Systems, a tech company that currently enjoys an estimated 50% market share among home users and small businesses. Experts say while the proposed ban may have more to do with TP-Link’s ties to China than any specific technical threats, much of the rest of the industry serving this market also sources hardware from China and ships…

Read More

The who, where, and how of APT attacks in Q2 2025–Q3 2025

ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report 07 Nov 2025 Yesterday, the ESET research team released the latest issue of its APT Activity Report that summarizes and contextualizes the cyber-operations of some of the world’s most notorious state-aligned hacking groups from April to September 2025. The report documents how the groups targeted entities across sectors and geographies in an attempt to…

Read More

Cybersecurity Awareness Month 2025: Why software patching matters more than ever

As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly. 14 Oct 2025 Last year set a new record for newly-disclosed software vulnerabilities, with the total tally at around 40,000, an increase of some 30 percent from the year before. As 2025 is on track to set another record all while attackers increasingly exploit vulnerabilities to compromise organizations, a failure to patch your software on time…

Read More

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025  •  , 7 min. read The cybersecurity community lost one of its luminaries with the passing of David Harley last week, at the age of 76. Despite being a self-described late entrant to IT, David went on to forge a long and distinguished career in cybersecurity that stretched from the early…

Read More