Phil Muncaster

Phil Muncaster

IT Journalist


Education: BA English Language and Literature; PGDip, Journalism

Highlights of your career: Living and working in Asia at the start of my freelance career. It opened a new chapter of my 20+ year career as a journalist and got me regular exposure in titles like The Register and MIT Technology Review.

Position and history at ESET: I’ve been contributing business and consumer-focused articles to ESET now for over three years.

What malware do you hate the most? All malware is bad malware. But ransomware can be existentially evil.

Favorite activities: Smashing tennis balls around, honing my Spanish, and finding amazing new places to eat out.

Golden rule for cyberspace? Practice good password hygiene, switch on MFA, use trusted security software, and keep your machine automatically updated.

When did you get your first computer and what kind was it? I think it was in a ZX Spectrum 48k back in the early 1980s, followed by the 128K version, which had non-rubber keys and a built-in tape deck!

Favorite computer game/activity: I haven’t played computer games since Sonic on the Sega Mega Drive. My activity du jour these days is rabbit-holing on a random topic while trying to research an important story online.

What titles have you worked on in the past and present? I started out as a reporter on UK enterprise IT title IT Week and then Computing—as News Editor. Next came The Register (as Asia correspondent), MIT Technology Review, SC Magazine, and IDG Connect. Today I mainly write for Infosecurity Magazine, Assured Intelligence and ISMS.online, and sporadically for other IT news and feature sites.


21 articles by Phil Muncaster

Featured

Sextortion explained: How to keep yourself and your family safe

Sextortion explained: How to keep yourself and your family safe

Featured

Sextortion explained: How to keep yourself and your family safe

We all know not to believe everything we read online. But when an email lands in your inbox from someone claiming to have compromiing images of you, reason tends to go out of the window.

Phil Muncaster30 Mar 202611 min. read


Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

How to remove your personal information from the internet: A step-by-step guide

Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

Your digital footprint reveals personal data that puts your security and privacy at risk. Here’s how to audit your exposure, remove PII, and stop it from resurfacing.

Phil Muncaster10 Mar 202614 min. read


Cybersecurity Protection

What is antivirus software, how does it work, and why does it still matter?

What is antivirus software, how does it work, and why does it still matter?

Cybersecurity Protection

What is antivirus software, how does it work, and why does it still matter?

Learn what antivirus software is, how modern antivirus works, what threats it blocks, and why it still matters.

Phil Muncaster24 Feb 20269 min. read


Featured

Docusign phishing emails: How to spot and stop attacks before it’s too late

Docusign phishing emails: How to spot and stop attacks before it’s too late

Featured

Docusign phishing emails: How to spot and stop attacks before it’s too late

Docusign attacks are growing more sophisticated. Small businesses should strengthen their defenses through advanced cybersecurity and awareness training.

Phil Muncaster17 Feb 20268 min. read


Featured

What is typosquatting, why does it matter, and how do I tackle it?

What is typosquatting, why does it matter, and how do I tackle it?

Featured

What is typosquatting, why does it matter, and how do I tackle it?

Typosquatting attacks abuse look-alike domains and user typos to steal credentials, spread malware and hijack traffic. Learn how modern typosquatting works in 2026, the main attack types, and how users, security teams and brands can prevent it.

Phil Muncaster12 Feb 202612 min. read


Privacy and Identity Protection

VPN vs. proxy: The definitive guide to digital security and privacy

VPN vs. proxy: The definitive guide to digital security and privacy

Privacy and Identity Protection

VPN vs. proxy: The definitive guide to digital security and privacy

Using the internet today is fraught with risk. Rising cybercrime, invasive advertising, and government surveillance have made us more aware of security and privacy. While regulations like GDPR and CCPA aim to protect our rights, not all organizations play fair.

Phil Muncaster15 Jan 20269 min. read


Featured

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Featured

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Cybersecurity has always been an arms race between attackers and defenders. Now AI is set to supercharge that dynamic.

Phil Muncaster22 Dec 202510 min. read


Featured

Is ChatGPT safe? The complete 2026 security & privacy guide

Is ChatGPT safe? The complete 2026 security & privacy guide

Featured

Is ChatGPT safe? The complete 2026 security & privacy guide

OpenAI has invested heavily in enterprise-grade security, but even with strong safeguards, real risks remain.

Phil Muncaster18 Dec 202511 min. read


Featured

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Featured

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-factor authentication (2FA) adds a second layer of login security. Discover the best methods and how to enable them.

Phil Muncaster20 Nov 20259 min. read