Latest Articles

Podcast

Why Is Your Data Worth So Much? | Cybersecurity Podcast

Why Is Your Data Worth So Much? | Cybersecurity Podcast

Podcast

Why Is Your Data Worth So Much? | Cybersecurity Podcast

In this episode of Unlocked 403, Becks sits down with Jake Moore, Global Security Advisor at ESET, to unpack how social media platforms harvest and monetize our data.

Alžbeta Kovaľová01 Jul 2025


Family Safety Online

Which online myths are your kids falling for? Learn how to recognize them

Which online myths are your kids falling for? Learn how to recognize them

Family Safety Online

Which online myths are your kids falling for? Learn how to recognize them

Today, with the rise of social media algorithms, viral challenges, and AI-generated content, it has become increasingly difficult to tell what’s real and what’s not.

James Shepperd01 Jul 2025


Prevention and Awareness

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Prevention and Awareness

Reasons to be positive about cybersecurity and supply chain risk on Micro-, Small and Medium-sized Enterprises Day

Despite rising challenges, SMEs worldwide are embracing new tools and support to grow stronger and more secure.

Ben Tudor27 Jun 2025


Cybersecurity Protection

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

Cybersecurity Protection

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

How a novel attack scenario spotted in Eastern Europe became a global threat.

Roman Cuprik27 Jun 2025


Threat landscape

Why genuine digital sovereignty requires European IT security

Why genuine digital sovereignty requires European IT security

Threat landscape

Why genuine digital sovereignty requires European IT security

As Europe is rocked by recent global developments, it should harness the talent of its capable citizens to secure Europe physically and digitally.

Márk Szabó and André Lameiras25 Jun 2025


Threat landscape

Webmail services are under a barrage of XSS attacks. What SMBs need to know

Webmail services are under a barrage of XSS attacks. What SMBs need to know

Threat landscape

Webmail services are under a barrage of XSS attacks. What SMBs need to know

XSS attacks are a prevalent threat but can be stopped at multiple stages, and businesses need only simple tools to do it.

Roman Cuprik20 Jun 2025


Privacy and Identity Protection

Incognito Mode: What it does, what it doesn’t do, and why it matters

Incognito Mode: What it does, what it doesn’t do, and why it matters

Privacy and Identity Protection

Incognito Mode: What it does, what it doesn’t do, and why it matters

Incognito mode is a useful tool but does not equal complete anonymity.

James Shepperd19 Jun 2025


Device Protection

iPhone malware: How can I remove it from my device?

iPhone malware: How can I remove it from my device?

Device Protection

iPhone malware: How can I remove it from my device?

Apple’s iPhones have long been considered among the most secure devices on the planet. But they’re not perfect. Here's why.

Phil Muncaster17 Jun 2025


Threat landscape

Critical Infrastructure: Healthcare in the crosshairs of cyber attackers

Critical Infrastructure: Healthcare in the crosshairs of cyber attackers

Threat landscape

Critical Infrastructure: Healthcare in the crosshairs of cyber attackers

Among the diversity of attacks on critical infrastructure, ensuring security for healthcare remains central to the trust we place in government and the IT sector. Let’s take a look at where things stand.

Márk Szabó and André Lameiras12 Jun 2025


MDR & Services

What is security as a service, and why is it useful?

What is security as a service, and why is it useful?

MDR & Services

What is security as a service, and why is it useful?

Feeling lost on the vast sea of cybersecurity? Worried about those malicious entities swimming about? Don’t worry; security services are here to rescue you and put a stop to those hungry sharks.

Márk Szabó11 Jun 2025


Device Protection

Is your phone being tracked? How to tackle mobile device privacy and security risks

Is your phone being tracked? How to tackle mobile device privacy and security risks

Device Protection

Is your phone being tracked? How to tackle mobile device privacy and security risks

For most of us, the primary gateway to our digital world is our smartphone. That makes it an attractive target for cybercriminals, government snoopers, advertisers and even jealous partners. This represents a potentially serious security and privacy risk.

Phil Muncaster10 Jun 2025


Prevention and Awareness

World Environment Day: Remote work as a secure, sustainable, and cost-beneficial business practice

World Environment Day: Remote work as a secure, sustainable, and cost-beneficial business practice

Prevention and Awareness

World Environment Day: Remote work as a secure, sustainable, and cost-beneficial business practice

Working from home has many benefits; among them is an environmental advantage – which is now more crucial than ever.

Márk Szabó05 Jun 2025


Prevention first cybersecurity as a service
ESET Home Security