Many individuals accumulate inactive online accounts over time, presenting security risks as they are prime targets for cybercriminals. Dormant accounts often lack robust security measures, making them susceptible to breaches. Regularly auditing and removing these accounts, along with strengthening security for active ones, is essential for safeguarding personal information.
NEWSROOM

News Highlights
Comprehensive collection of ESET News, including the highest performing press releases, research, and thought leadership content gathered on single page.
They’re coming for your data: What are infostealers and how do I stay safe?
Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data In the...
1 billion reasons to protect your identity online
In 2024, the US faced 3,158 data breaches, leading to over 1.3 billion notifications to victims. Personal data like names, addresses, and financial details are at risk, facilitating identity fraud through various methods, including phishing and malware. Preventive measures include strong passwords, security software, and cautious online behavior to protect against theft.
When IT meets OT: Cybersecurity for the physical world
Organizations in critical infrastructure must prioritize operational technology (OT) cybersecurity. Incidents like the BlackEnergy and Industroyer attacks in Ukraine demonstrate the severe risks associated with OT threats. With increased connectivity and outdated practices, vulnerabilities persist. A layered security approach encompassing asset management, vulnerability scanning, and continuous training is essential to mitigate risks effectively.
Don’t let cybercriminals steal your Spotify account
Securing your Spotify account is crucial given the rise of hacking attempts targeting users. Cybercriminals exploit compromised accounts for personal data, streaming fraud, and selling credentials. Phishing, fake apps, malware, and data leaks are primary tactics used to gain access. Users should adopt strong passwords, enable two-factor authentication, and remain vigilant against suspicious activity.
Gaming or gambling? Lifting the lid on in-game loot boxes
The rise of loot boxes and microtransactions in video games has blurred the lines between gaming and gambling, posing risks, especially for children and teens. These elements may contribute to gambling addiction, with many youths unaware of their gambling-like behavior. Parents are encouraged to monitor gaming habits and engage in discussions about these risks.






