Award-winning news, views, and insight from the ESET security community
How To, Internet of Things, Digital Security, Privacy
Gathering dust and data: How robotic vacuums can spy on you.
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
Roman Cuprik • 26 Jul 2023
Internet of Things
Hear no evil: Ultrasound attacks on voice assistants
How your voice assistant could do the bidding of a hacker – without you ever hearing a thing
Márk Szabó • 07 Jun 2023
Hacking baby monitors can be child’s play: Here’s how to stay safe
Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk
Phil Muncaster • 07 Nov 2022
8 questions to ask yourself before getting a home security camera
As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?
Phil Muncaster • 03 Oct 2022
Kids Online, Internet of Things
Toys behaving badly: How parents can protect their family from IoT threats
It pays to do some research before taking a leap into the world of internet-connected toys
Phil Muncaster • 08 Sep 2022
Malware
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
Rene Holt • 16 Jun 2022
Internet of Things, Privacy
Every breath you take, every move you make: Do fitness trackers pose privacy risks?
Should you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.
Phil Muncaster • 26 Jan 2022
Virus Bulletin: Old malware never dies – it just gets more targeted
Putting a precision payload on top of more generic malware makes perfect sense for malware operators
Cameron Camp • 15 Oct 2021
FBI removes web shells from compromised Exchange servers
Authorities step in to thwart attacks leveraging the recently-disclosed Microsoft Exchange Server vulnerabilities
Amer Owaida • 14 Apr 2021