WeLiveSecurity WeLiveSecurity
- OfferUp scammers are out in force: Here’s what you should knowon February 4, 2026 at 10:00 am
The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
- A slippery slope: Beware of Winter Olympics scams and other cyberthreatson February 2, 2026 at 10:00 am
It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.
- This month in security with Tony Anscombe – January 2026 editionon January 30, 2026 at 3:20 pm
The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year
- DynoWiper update: Technical analysis and attributionon January 30, 2026 at 10:28 am
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector
- Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistanon January 28, 2026 at 9:59 am
ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
- Drowning in spam or scam emails? Here’s probably whyon January 27, 2026 at 10:00 am
Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.
- ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025on January 23, 2026 at 4:58 pm
The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
- Children and chatbots: What parents should knowon January 23, 2026 at 10:00 am
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
- Common Apple Pay scams, and how to stay safeon January 22, 2026 at 10:00 am
Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
- Old habits die hard: 2025’s most common passwords were as predictable as everon January 20, 2026 at 10:00 am
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
- Why LinkedIn is a hunting ground for threat actors – and how to protect yourselfon January 16, 2026 at 10:00 am
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.
- Is it time for internet services to adopt identity verification?on January 14, 2026 at 10:00 am
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
- Your personal information is on the dark web. What happens next?on January 13, 2026 at 10:00 am
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
- Credential stuffing: What it is and how to protect yourselfon January 8, 2026 at 10:00 am
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts
- This month in security with Tony Anscombe – December 2025 editionon December 29, 2025 at 10:00 am
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
- A brush with online fraud: What are brushing scams and how do I stay safe?on December 23, 2025 at 10:00 am
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
- Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Componenton December 22, 2025 at 9:55 am
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
- LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japanon December 18, 2025 at 10:00 am
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
- ESET Threat Report H2 2025on December 16, 2025 at 9:50 am
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
- Black Hat Europe 2025: Was that device designed to be on the internet at all?on December 12, 2025 at 3:22 pm
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found







