top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Playing your part in building a safer digital world: Why cybersecurity matters
In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and...
ESET Expert
Oct 4, 2023


5 of the top programming languages for cybersecurity
While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t...
ESET Expert
Sep 28, 2023


Can open-source software be secure?
Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in...
ESET Expert
Sep 26, 2023


10 tips to ace your cybersecurity job interview
Once you’ve made it past the initial screening process and secured that all-important interview, it’s time to seal the deal. These 10...
ESET Expert
Sep 18, 2023


Jury vindicates ESET following eight-year court battle
ESET has welcomed a California federal jury’s ruling in its favor, finding that the leading digital security provider has not committed...
ESET Expert
Sep 15, 2023


What employees need to know before chatting with ChatGPT
Discussions about AI tools have become the most prominent in the past months. Because of their ability to boost productivity and save...
ESET Expert
Sep 11, 2023


Getting off the hook: 10 steps to take after clicking on a phishing link
Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The...
ESET Expert
Sep 8, 2023


Staying ahead of threats: 5 cybercrime trends to watch
New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought. Law...
ESET Expert
Sep 8, 2023


Cyber Threat Intelligence: A Comprehensive Guide to Your Threat Defense
The adoption of cyber threat intelligence (CTI) capabilities is one of the most impactful ways to stay informed and well-equipped in...
ESET Expert
Aug 30, 2023


Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?
The campaign started with a trojanized version of unsupported financial software. The compromise of the 3CX communication software made...
ESET Expert
Aug 29, 2023
Tags
Newsletter
Follow us
Shop our products
bottom of page















