In this episode of Unlocked 403, Becks is joined by Lukas Stefanko, leading malware researcher at ESET, to unpack the evolution of espionage in the digital age — and how our smartphones became a new battleground.They explore the shift from Cold War tactics to today’s silent threats, like spyware tools embedded in seemingly harmless apps. From the basics of what spyware is and how it operates, to real-world examples like BadBazaar and the infamous Pegasus, this conversation dives deep into how threat actors can turn phones into surveillance devices.Don’t forget to comment and subscribe!Topics:(00:00) – Intro (00:56) – Meet Lukas Stefanko (01:36) – Espionage: Then & Now (02:58) – Today’s Cyber Espionage Tools (03:57) – What Is Spyware? (05:58) – How Spyware Infects Devices (08:48) – Are Smartphones More Vulnerable? (12:37) – The BadBazaar Espionage Tool (17:34) – How Long Does Spyware Stay Active? (21:28) – Pegasus: Mobile Surveillance at Scale (24:36) – Government Use of Pegasus (26:30) – Can Spyware Tools Be Regulated? (27:18) – Removing Spyware from Your Device (30:10) – What About Military-Grade Spyware? (31:17) – Top 3 Tips to Stay Safe Online (32:45) – OutroConnect With Us:Our Main Site: https://www.eset.com/int/X: https://twitter.com/ESETInstagram https://www.instagram.com/eset/Facebook https://www.facebook.com/esetLinkedIn https://www.linkedin.com/company/eset/TikTok https://www.tiktok.com/@eset_globalWeLiveSecurity blog https://www.welivesecurity.com/Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/YouTube: https://www.youtube.com/c/esetglobal
--------
33:56
--------
33:56
Why Is Your Data Worth So Much?
In this episode of Unlocked 403, Becks talks with Jake Moore, Global Security Advisor at ESET, about what it really means when we say “you are the product.”They explore how social media platforms collect and use our data, what risks that poses—especially for kids—and how users can take back some of the control.From data minimization to metadata, the right to be forgotten, and tips for staying safe online, this episode is packed with practical advice and insights.Don’t forget to like, comment, and subscribe!Topics:(00:00) - Intro(01:15) - Jake Moore returns(03:32) - If it's free, are you the product?(04:51) - Personally identifiable information (08:12) - Are you sharing too much online?(09:13) - Think twice before you post(12:04) - Fist-party vs. Third party data collection(14:43) - Data minimization(16:07) - Privacy settings to the rescue?(17:31) - Double-check Terms & Conditions(18:52) - What is metadata?(19:55) - Handling of metadata online(22:05) - Has data collection changed society?(24:18) - Ethics of data collection(26:48) - TOP 3 tips to stay safe online(28:23) - OutroConnect With Us:Our Main Site: https://www.eset.com/int/X: https://twitter.com/ESETInstagram https://www.instagram.com/eset/Facebook https://www.facebook.com/esetLinkedIn https://www.linkedin.com/company/eset/TikTok https://www.tiktok.com/@eset_globalWeLiveSecurity blog https://www.welivesecurity.com/Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/YouTube: https://www.youtube.com/c/esetglobal
--------
29:17
--------
29:17
How to get into Cybersecurity
In this episode of Unlocked 403, cybersecurity podcast by ESET, Becks sits down with Robert Lipovský, Principal Threat Intelligence Researcher at ESET, to talk all things cyber!They dive into how they got started in cybersecurity, what it really takes to thrive in the field, and why a university diploma isn’t your only golden ticket. Whether you’re eyeing a technical path or a non-technical role, this conversation breaks down the skills, mindset, and passion needed to make it in this ever-evolving industry.Curious about a career in cyber? This one's for you.Don’t forget to comment, and subscribe for more from cybersecurity and tech!Topics:(00:00) - Intro(01:15) - Principal threat intelligence researcher(01:52) - How did Robert get into cybersecurity? (03:27) - QUIZ! (05:57) - A typical day in cybersecurity(07:58) - Research cycle(10:08) - Myths about cybersecurity(11:37) - How to start a cybersecurity career?(13:17) - Job diversity in cybersecurity (15:41) - What are the requirements? (17:01) - How much experience do you need to have? (19:19) - I hired a 17-year-old without a diploma(20:10) - Most in-demand skills in cybersecurity(21:40) - Cybersecurity communication(23:18) - Future of cybersecurity(24:21) - TOP 3 advice for a cybersecurity career(27:01) - OutroConnect With Us:Our Main Site: https://www.eset.com/int/X: https://twitter.com/ESETInstagram https://www.instagram.com/eset/Facebook https://www.facebook.com/esetLinkedIn https://www.linkedin.com/company/eset/TikTok https://www.tiktok.com/@eset_globalWeLiveSecurity blog https://www.welivesecurity.com/Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/YouTube: https://www.youtube.com/c/esetglobal
--------
28:09
--------
28:09
Can We Counter Online Disinformation?
Why are we so quick to believe and share false information online? In this episode of Unlocked 403, Becks talks with the lead researcher from KInIT, Jakub Šimko, to explore how social media’s design and human psychology work together to fuel the spread of false information.Follow @kinit_institute KInIT websiteDon’t forget to like, comment, and subscribe for more from cybersecurity and tech!Topics:(00:00) - Intro(00:53) - Discover KInIT (02:01) - Misinformation vs. Disinformation(03:27) - The spread of false information(05:07) - Which topics gain the most traction?(06:31) - Evolution of disinformation tactics(07:50) - Is attention span at fault?(08:40) - How is false information created?(12:15) - Deepfake Quiz - Image sample(13:32) - Deepfake Quiz - Image sample(14:14) - Deepfake Quiz - Video sample(15:43) - Deepfake Quiz - Audio sample(18:05) - Deepfake Quiz - Results(18:43) - Why are we susceptible to misinformation?(21:05) - Seeing things from both perspectives(22:42) - AI to counter disinformation?(24:39) - Censorship(25:57) - Free speech vs. Content moderation(27:28) - Jakub Šimko's advice(28:33) - OutroConnect With Us:X | Instagram | TikTok | Facebook | LinkedIn | YoutubeOur Main Site | WeLiveSecurity | Corporate Blog
--------
29:16
--------
29:16
AI's Biggest Surprises and Trends
Welcome to Season 2 of Unlocked 403! Kicking off the new season, Becks sits down with cybersecurity expert Ondrej Kubovič to break down the biggest AI developments of the past year—the good, the bad, and the downright unexpected.From AI’s role in modern warfare to its impact on everyday life, we explore how artificial intelligence is reshaping the world around us. What were the most surprising AI breakthroughs? How is it influencing cybersecurity? And what does the future hold? Tune in to find out!Don’t forget to like, comment, and subscribe for more from cybersecurity and tech!Check out ESET Research PodcastTopics:(00:00) - Intro(00:50) - Ondrej is back!(01:52) - What´s new with AI?(03:02) - Agentic AI(05:14) - Still MLM’s(06:16) - Most surprising use of AI(09:34) - AI in modern war(11:32) - How AI is changing warfare?(13:20) - Could AI decide to destroy humanity?(14:25) - AI in healthcare(16:10) - AI in cybersecurity(17:37) - How cybercriminals are using AI?(20:05) - Follow-up scams(21:34) - How to fight AI scams?(23:04) - Nobody is prepared(24:40) - AI trends in 2025(27:14) - AI-generated content(29:00) - AI in CyberSec predictions in 2025(30:00) - What people get wrong about AI?(31:55) - Outro Connect With Us:X | Instagram | TikTok | Facebook | LinkedIn | YoutubeOur Main Site | WeLiveSecurity | Corporate Blog
Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digital security, we´ve got you covered. If you feel at home in cyberspace, we invite you to listen to experts from ESET, talk about their fascinating jobs as well as the latest threats and trends.