ESET Cybersecurity Trends for the year 2021
Tomáš Foltýn, security writer at ESET looks back at some of the key themes that defined the cybersecurity landscape in the year that’s ending and give their takes on what to expect in 2021.Read More…
Tomáš Foltýn, security writer at ESET looks back at some of the key themes that defined the cybersecurity landscape in the year that’s ending and give their takes on what to expect in 2021.Read More…
Tomas Foltyn, security writer at ESET discusses the privacy and security issues faced by the videoconferencing platform, Zoom that has caught the fancy of millions of users worldwide either for work or education or leisure purpose, as they get confined to their homes amid efforts to contain the COVID-19 pandemic.Read More…
Tomas Foltyn, security writer at ESET explains that recently an popular WordPress theme plugin, ThemeGrill Demo Importer was found to contain a serious vulnerabilities exposing nearly 200,000 websites to security risks .Read More…
Tomas Foltyn, security writer at ESET that incidents like CCTV feed been tapped or hacked and even putting CCTV’s out of action can be attributed to poor security settings and poor password hygiene. Read More…
Tomas Foltyn, security writer at ESET discusses the questionable choices when it comes to the passwords user create to protect their accounts. The best that can be said about such passwords is that these passwords may win the popularity contest but lose flat out in securityRead More…
Tomas Foltyn, security writer at ESET discusses the risks that may come with sharing selfies, especially for kids and also shares few steps to safeguard kids against such risks.Read More…
Tomas Foltyn, security writer at ESET discusses the leak, which apparently has yet to be plugged, exposes a range of very specific data about usersRead More…
Tomas Foltyn, security writer at ESET discusses that a critical bug has been found in one of the most popular mail server software, Exim and if it is exploited, the security hole in Exim could allow attackers to run arbitrary commands on vulnerable mail servers.Read More…
Copyright © 2023 - Zarks Media. All rights reserved