Information

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Business Security While you’re enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company’s defenses are ready, no matter the time of year Phil Muncaster 18 Dec 2024  •  , 4 min. read The festive holidays are almost here. Pretty soon, many of us will be sticking on our “out of office” and settling in for a few days of well-earned rest. But the same is…

Read More

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow Tony Anscombe 13 Dec 2024  •  , 3 min. read A presentation that includes in its title ‘Compromise of Modern Vehicles” may set the expectation that you are about to see a dramatic demonstration of a hacked car suddenly stopping or swerving under the control of a bad actor. Read the abstract…

Read More

ESET Threat Report H2 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure in 2025 16 Dec 2024 This week, the ESET research team released the H2 2024 issue of the ESET Threat Report, offering a detailed look at the key trends and developments that shaped the cybersecurity landscape from June to November of this year. The report confirms, among other things, the trend that state-aligned cyberespionage groups…

Read More

U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason”

A U.S. Army soldier who pleaded guilty last week to leaking phone records for high-ranking U.S. government officials searched online for non-extradition countries and for an answer to the question “can hacking be treason?” prosecutors in the case said Wednesday. The government disclosed the details in a court motion to keep the defendant in custody until he is discharged from the military. One of several selfies on the Facebook page of Cameron Wagenius. Cameron John…

Read More

ESET Research Podcast: Telekopye, again

ESET Research Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of ‘Neanderthals’ wield the Telekopye toolkit to ensnare unsuspecting victims they call ‘Mammoths’ ESET Research 20 Dec 2024  •  , 1 min. read Neanderthals hunting Mammoths are back. Of course, we’re not talking about some Jurassic-Park-like technology that resurrected them in a remote region. No, this episode of ESET Research Podcast returns to the malicious…

Read More

Chris Hadfield: The sky is falling – what to do about space junk? | Starmus highlights

WeLiveScience The first Canadian to walk in space dives deep into the origins of space debris, how it’s become a growing problem, and how we can clean up the orbital mess 23 Dec 2024 Out on a spacewalk, what’s the one thing every astronaut dreads? Believe it or not, the answer is – getting hit by space debris. This is because even small pieces of debris moving at high velocities can cause catastrophic damage to…

Read More

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (special edition)

ESET’s Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud 19 Dec 2024 The holidays are here, bringing joy, a well-earned rest… and unfortunately, a surge in online scams. In this episode of Unlocked 403, Becks is joined by ESET Global Security Advisor Jake Moore to explore how cybercriminals exploit the festive spirit to deceive unsuspecting victims. From fake…

Read More

Gary Marcus: Taming Silicon Valley | Starmus highlights

WeLiveScience The prominent AI researcher explores the societal impact of artificial intelligence and outlines his vision for a future in which AI upholds human rights, dignity, and fairness 03 Jan 2025 Will artificial intelligence (AI) be good for society or bad for society? What kind of artificial intelligence (AI) should we want? These are among the most pressing questions of our time, and they’re at the very heart of Gary Marcus’s talk. The prominent AI…

Read More

This month in security with Tony Anscombe – December 2024 edition

From attacks leveraging new new zero-day exploits to a major law enforcement crackdown, December 2024 was packed with impactful cybersecurity news 27 Dec 2024 From new zero-day exploits to a major law enforcement crackdown, December 2024 was packed with impactful cybersecurity news. ESET Chief Security Evangelist Tony Anscombe dives into some of the month’s key stories, offering expert insights and commentary. Watch the video for a full breakdown and stay until the end to learn…

Read More

AI moves to your PC with its own special hardware

Digital Security Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU. Cameron Camp 06 Jan 2025  •  , 3 min. read Running AI workloads with sensitive data in the public cloud has its disadvantages, but a new generation of laptops can now perform many of the same tasks locally, in smaller form, and at a much lower cost.…

Read More