Modern chatbots, such as ChatGPT, are built on large language models (LLMs) ― they are not just a new form of entertainment today. This technology is increasingly being used to enhance employee productivity and efficiency. Considering their capabilities, such tools can completely replace certain positions, particularly in areas such as coding, content creation, and customer ...
Collects not only dust but also data: how a robot vacuum cleaner can spy on you
Since their market debut in the 2000s, robotic vacuum cleaners have significantly improved. They can quickly clean all rooms, avoiding any objects. However, convenience comes at a cost beyond just money. To handle obstacles, modern robotic vacuum cleaners are equipped ...
Fraud with virtual kidnapping: how not to fall into the trap
A call from an unknown number and a ransom demand for a loved one is not a new method of fraud. However, due to the development of artificial intelligence and the emergence of voice cloning technology, this scheme is becoming ...
Why is it important to update devices and applications on them?
Notifications about the need to update the device, particularly the software and operating system, come regularly. However, we often decline them due to a lack of time or being busy with daily tasks. In this regard, ESET specialists decided to ...
Ranking of the worst passwords of 2022: check which ones you are using
Today, passwords remain the most popular way to access dozens of accounts—from streaming services and online banking to email and social networks. And even despite the storage of bank card data and other personal information in these accounts, users continue ...
Technical support scams: how to avoid falling into the trap
For years, criminals have been using technical support scams to deceive users under the pretext of solving their "problems" with devices or software. Thanks to sophisticated social engineering methods, scammers easily manage to trick users into giving up their money ...
Relevant, urgent, or free: how scammers lure you into opening a phishing email
By spreading phishing emails aimed at stealing personal data, hackers resort to various sophisticated methods—from prompting quick, thoughtless actions to exploiting users' interest in current topics. For example, recently, taking advantage of the popularity of the movie "Barbie," cybercriminals started ...
Which posts are better to avoid for safety on social media and beyond
March 11, 2024 Millions of users daily use their favorite social networks for shopping, posting photos, viewing news, and communicating. However, often careless handling of personal data on social networks can lead to fraud, password theft, and sometimes even the ...