Cybersecurity Protection


32 articles

Cybersecurity Protection

How to block websites on Chrome, Safari, iPhone, and more — a step-by-step guide

How to block websites on Chrome, Safari, iPhone, and more — a step-by-step guide

Cybersecurity Protection

How to block websites on Chrome, Safari, iPhone, and more — a step-by-step guide

It’s easy to get overwhelmed by digital content. There are endless ways to waste your time online today, and some of them can even be harmful to your online safety and privacy. There are also some sites you’d probably prefer your kids not to access.

Phil Muncaster 30 Sep 2025


Cybersecurity Protection

How to detect deepfakes: A practical guide to spotting AI-Generated misinformation

How to detect deepfakes: A practical guide to spotting AI-Generated misinformation

Cybersecurity Protection

How to detect deepfakes: A practical guide to spotting AI-Generated misinformation

Deepfakes aren’t just a technological curiosity – they’re a fast-evolving threat with real-world consequences.

Jake Moore 28 Aug 2025


Cybersecurity Protection

The spam crisis: Why “scam likely” calls are plaguing us

The spam crisis: Why “scam likely” calls are plaguing us

Cybersecurity Protection

The spam crisis: Why “scam likely” calls are plaguing us

To understand the rise of spam calls, we need to look beyond the ringing phone – to the technology, tactics, and loopholes that fuel them.

Editorial Team 22 Jul 2025


Cybersecurity Protection

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

Cybersecurity Protection

Now it is certain: NFC data for contactless payments are the new target. Here is what you need to know.

How a novel attack scenario spotted in Eastern Europe became a global threat.

Roman Cuprik 27 Jun 2025


Cybersecurity Protection, Device Protection

Lock and key: Securing important files with encryption

Lock and key: Securing important files with encryption

Cybersecurity Protection, Device Protection

Lock and key: Securing important files with encryption

Encryption is often used in business settings to protect confidential data… so why not apply the same security for personal use?

Márk Szabó 23 May 2025


Cybersecurity Protection

ESET Cyber Security Pro and ESET Cyber Security merge

ESET Cyber Security Pro and ESET Cyber Security merge

Cybersecurity Protection

ESET Cyber Security Pro and ESET Cyber Security merge

From now on, ESET will focus on the new, improved version of ESET Cyber Security for macOS.

Roman Cuprik 20 May 2025


Cybersecurity Protection

How cybercriminals target gamers

How cybercriminals target gamers

Cybersecurity Protection

How cybercriminals target gamers

Even players who don’t pirate games or use cheats can fall victim.

Christian Ali Bravo 01 May 2025


Cybersecurity Protection

Venmo scams are on the rise: Here’s how to keep your money and data safe

Venmo scams are on the rise: Here’s how to keep your money and data safe

Cybersecurity Protection

Venmo scams are on the rise: Here’s how to keep your money and data safe

When an app’s customer base is as varied as the number of scams designed to defraud them, it’s better to be safe than sorry.

Phil Muncaster 15 Apr 2025


Cybersecurity Protection

How Spotify accounts are compromised (and how to prevent it)

How Spotify accounts are compromised (and how to prevent it)

Cybersecurity Protection

How Spotify accounts are compromised (and how to prevent it)

Even music streaming services can be a target. Don’t play with cybercriminals, check out these tips on how to stay safe.

Christian Ali Bravo 10 Apr 2025