Latest Cybersecurity Articles

Device Protection

This shopping season will be different. Prepare for AI-powered scams targeting Android

This shopping season will be different. Prepare for AI-powered scams targeting Android

Device Protection

This shopping season will be different. Prepare for AI-powered scams targeting Android

Cybercriminals can utilize new AI-powered threats for Android before Christmas. Learn how to avoid them.

Roman Cuprik28 Nov 2025


What is

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

What is

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-factor authentication (2FA) adds a second layer of login security. Discover the best methods and how to enable them.

Phil Muncaster20 Nov 2025


Endpoint Security and XDR

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

Endpoint Security and XDR

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

AV-Comparatives Endpoint Prevention and Response (EPR) Comparative Report 2025 shows that the ESET PROTECT platform delivers on prevention and response.

James Shepperd19 Nov 2025


Privacy and Identity Protection

What to do if your Facebook account is hacked

What to do if your Facebook account is hacked

Privacy and Identity Protection

What to do if your Facebook account is hacked

How to secure and recover a hacked Facebook account with the minimum of stress.

Ben Tudor13 Nov 2025


MDR & Services

ETeC 2025: Living in the trenches with ESET MDR

ETeC 2025: Living in the trenches with ESET MDR

MDR & Services

ETeC 2025: Living in the trenches with ESET MDR

Join us for another “Story time with James” and hear more about what ESET MDR can see and do for you.

Márk Szabó12 Nov 2025


MDR & Services

European MDR: Now a major league of its own

European MDR: Now a major league of its own

MDR & Services

European MDR: Now a major league of its own

Five years after Schrems II collapsed the US-EU Privacy Shield agreement, the market for European Managed Detection and Response (MDR) is thriving.

Ben Tudor11 Nov 2025


Prevention and Awareness

How to secure aviation’s connected systems

How to secure aviation’s connected systems

Prevention and Awareness

How to secure aviation’s connected systems

In aviation, getting more connected might take on a dangerous dimension.

Márk Szabó06 Nov 2025


Family Safety Online

Digital hygiene for kids: How to build healthy screen habits and mindful tech use in 2025

Digital hygiene for kids: How to build healthy screen habits and mindful tech use in 2025

Family Safety Online

Digital hygiene for kids: How to build healthy screen habits and mindful tech use in 2025

Help your child build a healthy relationship with technology, not by banning screens, but by teaching balance, awareness, and mindful use.

Roman Cuprik05 Nov 2025


Cybersecurity Protection

AI for cybersecurity: How it keeps you safe online

AI for cybersecurity: How it keeps you safe online

Cybersecurity Protection

AI for cybersecurity: How it keeps you safe online

AI is taking over the world in ways many of us don’t even notice. That includes the cybersecurity space where the technology is already being built into products and services to keep us safe from threats.

Phil Muncaster04 Nov 2025


Identity and Data Protection

Your passwords and credit cards are their loot: How infostealers work

Your passwords and credit cards are their loot: How infostealers work

Identity and Data Protection

Your passwords and credit cards are their loot: How infostealers work

At ESET’s annual technology conference ETeC 2025, malware researcher Jakub Kaloč explained how cybercriminals run infostealers as a service via a real-life demonstration.

Roman Cuprik03 Nov 2025


Threat landscape

How to protect valuable aviation and aerospace IP and R&D

How to protect valuable aviation and aerospace IP and R&D

Threat landscape

How to protect valuable aviation and aerospace IP and R&D

You can’t soar when your secrets are leaking below.

Márk Szabó and James Shepperd31 Oct 2025


Cybersecurity Protection

Fake alerts, real anxiety: Exposing an active scareware plot spreading via Meta newsfeeds

Fake alerts, real anxiety: Exposing an active scareware plot spreading via Meta newsfeeds

Cybersecurity Protection

Fake alerts, real anxiety: Exposing an active scareware plot spreading via Meta newsfeeds

Since scareware varies in form and capability, staying safe from such threats requires a robust cybersecurity solution and a sharp eye.

Roman Cuprik28 Oct 2025


Prevention first cybersecurity as a service
ESET Home Security