WeLiveSecurity WeLiveSecurity
- Mobile app permissions (still) matter more than you may thinkon February 27, 2026 at 10:00 am
Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.
- Faking it on the phone: How to tell if a voice call is AI or noton February 23, 2026 at 10:00 am
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.
- PromptSpy ushers in the era of Android threats using GenAIon February 19, 2026 at 10:30 am
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
- Is Poshmark safe? How to buy and sell without getting scammedon February 19, 2026 at 7:21 am
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.
- Is it OK to let your children post selfies online?on February 17, 2026 at 10:00 am
When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.
- Naming and shaming: How ransomware groups tighten the screws on victimson February 12, 2026 at 10:00 am
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle
- Taxing times: Top IRS scams to look out for in 2026on February 10, 2026 at 10:00 am
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.
- OfferUp scammers are out in force: Here’s what you should knowon February 4, 2026 at 10:00 am
The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
- A slippery slope: Beware of Winter Olympics scams and other cyberthreatson February 2, 2026 at 10:00 am
It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.
- This month in security with Tony Anscombe – January 2026 editionon January 30, 2026 at 3:20 pm
The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year
- DynoWiper update: Technical analysis and attributionon January 30, 2026 at 10:28 am
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector
- Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistanon January 28, 2026 at 9:59 am
ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
- Drowning in spam or scam emails? Here’s probably whyon January 27, 2026 at 10:00 am
Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.
- ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025on January 23, 2026 at 4:58 pm
The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
- Children and chatbots: What parents should knowon January 23, 2026 at 10:00 am
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
- Common Apple Pay scams, and how to stay safeon January 22, 2026 at 10:00 am
Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
- Old habits die hard: 2025’s most common passwords were as predictable as everon January 20, 2026 at 10:00 am
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
- Why LinkedIn is a hunting ground for threat actors – and how to protect yourselfon January 16, 2026 at 10:00 am
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.
- Is it time for internet services to adopt identity verification?on January 14, 2026 at 10:00 am
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
- Your personal information is on the dark web. What happens next?on January 13, 2026 at 10:00 am
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
- Credential stuffing: What it is and how to protect yourselfon January 8, 2026 at 10:00 am
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts
- This month in security with Tony Anscombe – December 2025 editionon December 29, 2025 at 10:00 am
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
- A brush with online fraud: What are brushing scams and how do I stay safe?on December 23, 2025 at 10:00 am
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
- Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Componenton December 22, 2025 at 9:55 am
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
- LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japanon December 18, 2025 at 10:00 am
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
- ESET Threat Report H2 2025on December 16, 2025 at 9:50 am
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
- Black Hat Europe 2025: Was that device designed to be on the internet at all?on December 12, 2025 at 3:22 pm
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
- Black Hat Europe 2025: Reputation matters – even in the ransomware economyon December 11, 2025 at 4:04 pm
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims
- Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurityon December 11, 2025 at 10:00 am
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
- Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpieceon December 10, 2025 at 3:03 pm
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.



