Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.

Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods?

Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable?

ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play

Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

The technology is both widely available and well developed, hence it’s also poised to proliferate – especially in the hands of those wishing ill

While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them

The holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats

ESET’s research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online