Phil Muncaster

Phil Muncaster

IT Journalist


Education: BA English Language and Literature; PGDip, Journalism

Highlights of your career: Living and working in Asia at the start of my freelance career. It opened a new chapter of my 20+ year career as a journalist and got me regular exposure in titles like The Register and MIT Technology Review.

Position and history at ESET: I’ve been contributing business and consumer-focused articles to ESET now for over three years.

What malware do you hate the most? All malware is bad malware. But ransomware can be existentially evil.

Favorite activities: Smashing tennis balls around, honing my Spanish, and finding amazing new places to eat out.

Golden rule for cyberspace? Practice good password hygiene, switch on MFA, use trusted security software, and keep your machine automatically updated.

When did you get your first computer and what kind was it? I think it was in a ZX Spectrum 48k back in the early 1980s, followed by the 128K version, which had non-rubber keys and a built-in tape deck!

Favorite computer game/activity: I haven’t played computer games since Sonic on the Sega Mega Drive. My activity du jour these days is rabbit-holing on a random topic while trying to research an important story online.

What titles have you worked on in the past and present? I started out as a reporter on UK enterprise IT title IT Week and then Computing—as News Editor. Next came The Register (as Asia correspondent), MIT Technology Review, SC Magazine, and IDG Connect. Today I mainly write for Infosecurity Magazine, Assured Intelligence and ISMS.online, and sporadically for other IT news and feature sites.


21 articles by Phil Muncaster

Cybersecurity Protection

AI for cybersecurity: How it keeps you safe online

AI for cybersecurity: How it keeps you safe online

Cybersecurity Protection

AI for cybersecurity: How it keeps you safe online

AI is taking over the world in ways many of us don’t even notice. That includes the cybersecurity space where the technology is already being built into products and services to keep us safe from threats.

Phil Muncaster04 Nov 20259 min. read


Cybersecurity Protection

Windows 10 End of Life: How to prepare for what comes next

Windows 10 End of Life: How to prepare for what comes next

Cybersecurity Protection

Windows 10 End of Life: How to prepare for what comes next

All good things come to an end. So it is with Windows 10, when Microsoft officially ends support on October 14, 2025.

Phil Muncaster09 Oct 202510 min. read


Privacy and Identity Protection

Scam Alert: How to spot fake PayPal emails

Scam Alert: How to spot fake PayPal emails

Privacy and Identity Protection

Scam Alert: How to spot fake PayPal emails

PayPal is an attractive target for cybercriminals and AI makes the problem even worse.

Phil Muncaster07 Oct 20259 min. read


Cybersecurity Protection

How to block websites on Chrome, Safari, iPhone, and more — a step-by-step guide

How to block websites on Chrome, Safari, iPhone, and more — a step-by-step guide

Cybersecurity Protection

How to block websites on Chrome, Safari, iPhone, and more — a step-by-step guide

It’s easy to get overwhelmed by digital content. There are endless ways to waste your time online today, and some of them can even be harmful to your online safety and privacy. There are also some sites you’d probably prefer your kids not to access.

Phil Muncaster30 Sep 202514 min. read


Device Protection

How to check if your router has been hacked—and what to do about it

How to check if your router has been hacked—and what to do about it

Device Protection

How to check if your router has been hacked—and what to do about it

Routers are the unsung heroes of the modern smart home. By wirelessly connecting your home network and all the devices on it to the public internet, it’s effectively the gateway to your digital world.

Phil Muncaster11 Sep 202511 min. read


Device Protection

The ultimate guide to hiding apps on your iPhone

The ultimate guide to hiding apps on your iPhone

Device Protection

The ultimate guide to hiding apps on your iPhone

iOS apps enhance our digital lives—but they can also clutter, distract, or compromise your privacy.

Phil Muncaster26 Aug 20258 min. read


Privacy and Identity Protection

Is your phone camera watching you? Spot the warning signs and protect your privacy

Is your phone camera watching you? Spot the warning signs and protect your privacy

Privacy and Identity Protection

Is your phone camera watching you? Spot the warning signs and protect your privacy

Concerned that your phone camera might be spying on you? Discover how to identify the warning signs and safeguard your privacy from intrusive eyes and invasive spyware.

Phil Muncaster19 Aug 20257 min. read


Device Protection

Jailbreaking and rooting exposed: Understanding hidden mobile security risks

Jailbreaking and rooting exposed: Understanding hidden mobile security risks

Device Protection

Jailbreaking and rooting exposed: Understanding hidden mobile security risks

If you decide to jailbreak or root your device, it could make you a target.

Phil Muncaster29 Jul 20258 min. read


Device Protection

What is mobile spyware and how do I fight back?

What is mobile spyware and how do I fight back?

Device Protection

What is mobile spyware and how do I fight back?

Our mobile devices are the gateway to our digital lives. The price we pay for this convenience is that it makes our devices an attractive target for malicious actors.

Phil Muncaster15 Jul 202511 min. read