NEWSROOM

News Highlights

Comprehensive collection of ESET News, including the highest performing press releases, research, and thought leadership content gathered on single page.

Filter News
Don’t let dormant accounts become a doorway for cybercriminals

Don’t let dormant accounts become a doorway for cybercriminals

Many individuals accumulate inactive online accounts over time, presenting security risks as they are prime targets for cybercriminals. Dormant accounts often lack robust security measures, making them susceptible to breaches. Regularly auditing and removing these accounts, along with strengthening security for active ones, is essential for safeguarding personal information.

1 billion reasons to protect your identity online

1 billion reasons to protect your identity online

In 2024, the US faced 3,158 data breaches, leading to over 1.3 billion notifications to victims. Personal data like names, addresses, and financial details are at risk, facilitating identity fraud through various methods, including phishing and malware. Preventive measures include strong passwords, security software, and cautious online behavior to protect against theft.

When IT meets OT: Cybersecurity for the physical world

When IT meets OT: Cybersecurity for the physical world

Organizations in critical infrastructure must prioritize operational technology (OT) cybersecurity. Incidents like the BlackEnergy and Industroyer attacks in Ukraine demonstrate the severe risks associated with OT threats. With increased connectivity and outdated practices, vulnerabilities persist. A layered security approach encompassing asset management, vulnerability scanning, and continuous training is essential to mitigate risks effectively.

Don’t let cybercriminals steal your Spotify account

Don’t let cybercriminals steal your Spotify account

Securing your Spotify account is crucial given the rise of hacking attempts targeting users. Cybercriminals exploit compromised accounts for personal data, streaming fraud, and selling credentials. Phishing, fake apps, malware, and data leaks are primary tactics used to gain access. Users should adopt strong passwords, enable two-factor authentication, and remain vigilant against suspicious activity.

Gaming or gambling? Lifting the lid on in-game loot boxes

Gaming or gambling? Lifting the lid on in-game loot boxes

The rise of loot boxes and microtransactions in video games has blurred the lines between gaming and gambling, posing risks, especially for children and teens. These elements may contribute to gambling addiction, with many youths unaware of their gambling-like behavior. Parents are encouraged to monitor gaming habits and engage in discussions about these risks.