Phil Muncaster

Phil Muncaster

IT Journalist


Education: BA English Language and Literature; PGDip, Journalism

Highlights of your career: Living and working in Asia at the start of my freelance career. It opened a new chapter of my 20+ year career as a journalist and got me regular exposure in titles like The Register and MIT Technology Review.

Position and history at ESET: I’ve been contributing business and consumer-focused articles to ESET now for over three years.

What malware do you hate the most? All malware is bad malware. But ransomware can be existentially evil.

Favorite activities: Smashing tennis balls around, honing my Spanish, and finding amazing new places to eat out.

Golden rule for cyberspace? Practice good password hygiene, switch on MFA, use trusted security software, and keep your machine automatically updated.

When did you get your first computer and what kind was it? I think it was in a ZX Spectrum 48k back in the early 1980s, followed by the 128K version, which had non-rubber keys and a built-in tape deck!

Favorite computer game/activity: I haven’t played computer games since Sonic on the Sega Mega Drive. My activity du jour these days is rabbit-holing on a random topic while trying to research an important story online.

What titles have you worked on in the past and present? I started out as a reporter on UK enterprise IT title IT Week and then Computing—as News Editor. Next came The Register (as Asia correspondent), MIT Technology Review, SC Magazine, and IDG Connect. Today I mainly write for Infosecurity Magazine, Assured Intelligence and ISMS.online, and sporadically for other IT news and feature sites.


16 articles by Phil Muncaster

What is

VPN vs. proxy: The definitive guide to digital security and privacy

VPN vs. proxy: The definitive guide to digital security and privacy

What is

VPN vs. proxy: The definitive guide to digital security and privacy

Using the internet today is fraught with risk. Rising cybercrime, invasive advertising, and government surveillance have made us more aware of security and privacy. While regulations like GDPR and CCPA aim to protect our rights, not all organizations play fair.

Phil Muncaster15 Jan 20269 min. read


Featured

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Featured

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Cybersecurity has always been an arms race between attackers and defenders. Now AI is set to supercharge that dynamic.

Phil Muncaster22 Dec 202510 min. read


Featured

Is ChatGPT safe? The complete 2026 security & privacy guide

Is ChatGPT safe? The complete 2026 security & privacy guide

Featured

Is ChatGPT safe? The complete 2026 security & privacy guide

OpenAI has invested heavily in enterprise-grade security, but even with strong safeguards, real risks remain.

Phil Muncaster18 Dec 202511 min. read


Featured

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Featured

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-factor authentication (2FA) adds a second layer of login security. Discover the best methods and how to enable them.

Phil Muncaster20 Nov 20259 min. read


Cybersecurity Protection

AI for cybersecurity: How it keeps you safe online

AI for cybersecurity: How it keeps you safe online

Cybersecurity Protection

AI for cybersecurity: How it keeps you safe online

AI is taking over the world in ways many of us don’t even notice. That includes the cybersecurity space where the technology is already being built into products and services to keep us safe from threats.

Phil Muncaster04 Nov 20259 min. read


Cybersecurity Protection

Windows 10 End of Life: How to prepare for what comes next

Windows 10 End of Life: How to prepare for what comes next

Cybersecurity Protection

Windows 10 End of Life: How to prepare for what comes next

All good things come to an end. So it is with Windows 10, when Microsoft officially ends support on October 14, 2025.

Phil Muncaster09 Oct 202510 min. read


Privacy and Identity Protection

Scam Alert: How to spot fake PayPal emails

Scam Alert: How to spot fake PayPal emails

Privacy and Identity Protection

Scam Alert: How to spot fake PayPal emails

PayPal is an attractive target for cybercriminals and AI makes the problem even worse.

Phil Muncaster07 Oct 20259 min. read


Cybersecurity Protection

Taking back control: How to block websites on Safari and Chrome

Taking back control: How to block websites on Safari and Chrome

Cybersecurity Protection

Taking back control: How to block websites on Safari and Chrome

It’s easy to get overwhelmed by digital content. There are endless ways to waste your time online today, and some of them can even be harmful to your online safety and privacy. There are also some sites you’d probably prefer your kids not to access. So, what’s the answer?

Phil Muncaster30 Sep 20259 min. read


Featured

How to check if your router has been hacked—and what to do about it

How to check if your router has been hacked—and what to do about it

Featured

How to check if your router has been hacked—and what to do about it

Routers are the unsung heroes of the modern smart home. By wirelessly connecting your home network and all the devices on it to the public internet, it’s effectively the gateway to your digital world.

Phil Muncaster11 Sep 202511 min. read