WhatsApp may soon roll out encrypted chat backups

WhatsApp may soon roll out encrypted chat backups

While chats are end-to-end encrypted, their backups are not – this may change soon WhatsApp is said to be working to add encryption for chat backups that will allow users to easily secure their conversations when storing them in the cloud. While the company does currently offer end-to-end encryption for messages, calls and other forms…
Online health security – when ‘opt out’ isn’t an option

Online health security – when ‘opt out’ isn’t an option

What happens when you try to opt out of e-health to avoid issues in the event of a breach? Healthcare hacks are particularly insidious. When hackers get the data, they hack you – or at least the closest facsimile there is of you. And unless you lie on your health records (and even then, there…
Exchange servers under siege from at least 10 APT groups

Exchange servers under siege from at least 10 APT groups

ESET Research has found LuckyMouse, Tick, Winnti Group, and Calypso, among others, are likely using the recent Microsoft Exchange vulnerabilities to compromise email servers all around the world On 2021-03-02, Microsoft released out-of-band patches for Microsoft Exchange Server 2013, 2016 and 2019. These security updates fixed a pre-authentication remote code execution (RCE) vulnerability chain (CVE-2021-26855,…
Sex in the digital era: How secure are smart sex toys?

Sex in the digital era: How secure are smart sex toys?

ESET researchers investigate what could possibly go wrong when you connect your bedroom to the internet of things As internet of things (IoT) devices continue to seep into our homes and offer an increasingly wide range of features, new concerns are beginning to arise about the security of the data processed by these devices. Although…
Facebook ramps up fight against child abuse content

Facebook ramps up fight against child abuse content

Two new tools will warn users about the risks of searching for and sharing content that exploits children, including the potential legal consequences of doing so Facebook has announced a pair of new tools to help combat child abuse and exploitation content on its platform and apps. While one tool aims to curb the potentially malicious…
Championing worthy causes: How ESET gives a helping hand

Championing worthy causes: How ESET gives a helping hand

A snapshot of some of the ways ESET makes an impact supporting the well-being of people, communities and the environment Technology companies have been developing software and hardware that has over time become an integral part of our lives. But besides providing people with the products they need, many companies are also an essential part…
Safeguarding children against cyberbullying in the age of COVID‑19

Safeguarding children against cyberbullying in the age of COVID‑19

As screen time has increased, so has the risk of cyberbullying. What you can do to help protect your children from online harassment? It’s been almost a year since the World Health Organization (WHO) declared the COVID-19 outbreak a pandemic, and people everywhere have been doing their best to adhere to regional and national stay-in-place…
Oxford University COVID‑19 lab hacked

Oxford University COVID‑19 lab hacked

Neither clinical research into the coronavirus nor any patient data were affected by the incident Oxford University has confirmed that one of its biology laboratories that is researching ways to combat the COVID-19 pandemic has fallen victim to a cyberattack. Details about the incident at the Division of Structural Biology (Strubi) were released by Forbes.…
Popular password manager in the spotlight over web trackers

Popular password manager in the spotlight over web trackers

While the trackers in LastPass’s Android app don’t collect any personal data, the news may not sit well with some privacy-minded users LastPass, a popular password manager, has come under some fire following a report that its Android app features seven built-in advertising and analytics trackers that gather data ranging from the user’s device type…
Not all cybercriminals are sophisticated

Not all cybercriminals are sophisticated

Some perpetrators of online crime and fraud don’t use advanced methods to profit at the expense of unsuspecting victims and to avoid getting caught While a lot of media coverage centers on how threat actors are becoming better at evading capture and generally deploy ever more sophisticated techniques, I wanted to tell a story where…