Category Archives: cyber
Taxing times: Top IRS scams to look out for in 2026
- Posted by rbetz
- Posted on February 11, 2026
- cyber
- Comments Off on Taxing times: Top IRS scams to look out for in 2026
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.
OfferUp scammers are out in force: Here’s what you should know
- Posted by rbetz
- Posted on February 5, 2026
- cyber
- Comments Off on OfferUp scammers are out in force: Here’s what you should know
The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
A slippery slope: Beware of Winter Olympics scams and other cyberthreats
- Posted by rbetz
- Posted on February 3, 2026
- cyber
- Comments Off on A slippery slope: Beware of Winter Olympics scams and other cyberthreats
It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.
DynoWiper update: Technical analysis and attribution
- Posted by rbetz
- Posted on January 31, 2026
- cyber
- Comments Off on DynoWiper update: Technical analysis and attribution
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector
This month in security with Tony Anscombe – January 2026 edition
- Posted by rbetz
- Posted on January 31, 2026
- cyber
- Comments Off on This month in security with Tony Anscombe – January 2026 edition
The trends that emerged in January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
- Posted by rbetz
- Posted on January 29, 2026
- cyber
- Comments Off on Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
Drowning in spam or scam emails? Here’s probably why
- Posted by rbetz
- Posted on January 28, 2026
- cyber
- Comments Off on Drowning in spam or scam emails? Here’s probably why
Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.
Children and chatbots: What parents should know
- Posted by rbetz
- Posted on January 24, 2026
- cyber
- Comments Off on Children and chatbots: What parents should know
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
- Posted by rbetz
- Posted on January 24, 2026
- cyber
- Comments Off on ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
Common Apple Pay scams, and how to stay safe
- Posted by rbetz
- Posted on January 23, 2026
- cyber
- Comments Off on Common Apple Pay scams, and how to stay safe
Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
Old habits die hard: 2025’s most common passwords were as predictable as ever
- Posted by rbetz
- Posted on January 21, 2026
- cyber
- Comments Off on Old habits die hard: 2025’s most common passwords were as predictable as ever
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
- Posted by rbetz
- Posted on January 17, 2026
- cyber
- Comments Off on Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.
Is it time for internet services to adopt identity verification?
- Posted by rbetz
- Posted on January 15, 2026
- cyber
- Comments Off on Is it time for internet services to adopt identity verification?
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
Your personal information is on the dark web. What happens next?
- Posted by rbetz
- Posted on January 14, 2026
- cyber
- Comments Off on Your personal information is on the dark web. What happens next?
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Credential stuffing: What it is and how to protect yourself
- Posted by rbetz
- Posted on January 9, 2026
- cyber
- Comments Off on Credential stuffing: What it is and how to protect yourself
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts




