Telekopye’s tricks of the trade – Week in security with Tony Anscombe
ESET’s research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online
Results driven. Results delivered.
ESET’s research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online
Insight into groups operating Telekopye bots that scam people in online marketplaces
AI-driven voice cloning can make things far too easy for scammers – I know because I’ve tested it so that you don’t have to learn about the risks the hard way.
What happens when problems caused by autonomous vehicles are not the result of errors, but the result of purposeful attacks?
An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause
Discover six games that will provide valuable knowledge while turning learning about digital security into an enjoyable and rewarding adventure
Through engaging hacking challenges and competitions, CTFs offer an excellent opportunity to test and enhance your security and problem-solving skills
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk
The Urdu version of the Hunza News website offers readers the option to download an Android app – little do they know that the app is actually spyware
ESET researchers discovered Kamran, previously unknown malware, which spies on Urdu-speaking readers of Hunza News