As the pandemic forces many employees to work from home, can your organization stay productive – and safe? The post COVID‑19 and the shift to remote work appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Category: welivesecurity
COVID‑19 and the forced workplace exodus
As the COVID-19 pandemic forces many employees to work from home, can your organization stay productive – and safe? The post COVID‑19 and the forced workplace exodus appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Beware scams exploiting coronavirus fears
From malware-laden emails to fake donations, these are some of the most common cons you should watch out for amid the public health crisis The post Beware scams exploiting coronavirus fears appeared first on WeLiveSecurity Advertise on IT Security…
Week in security with Tony Anscombe
ESET research into Turla’s new campaign – What is CEO fraud and how to defend against it – How Microsoft enterprise accounts get hacked The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT…
Radio.com users affected in data breach
An unknown number of people had their personal data exposed as hackers accessed database backup files The post Radio.com users affected in data breach appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Radio.com users…
4:15 p.m.: An urgent message from the CEO
What is CEO fraud, why is it so prevalent, and how can organizations recognize and defend themselves against these attacks? The post 4:15 p.m.: An urgent message from the CEO appeared first on WeLiveSecurity Advertise on IT Security News.…
The pitfalls of being an influencer: What parents should know and do
Does your child dream of becoming a YouTube or Instagram celebrity? The influencer lifestyle is not as picture-perfect as it may seem. The post The pitfalls of being an influencer: What parents should know and do appeared first on WeLiveSecurity…
European power grid organization hit by cyberattack
The incident affected our office network, says ENTSO-E, as it implements measures to avoid future cyber-incursions The post European power grid organization hit by cyberattack appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: European…
Tracking Turla: New backdoor delivered via Armenian watering holes
Can an old APT learn new tricks? Turla’s TTPs are largely unchanged, but the group recently added a Python backdoor. The post Tracking Turla: New backdoor delivered via Armenian watering holes appeared first on WeLiveSecurity Advertise on IT Security…
Flaw in popular VPN service may have exposed customer data
NordVPN praised its bug bounty program and said that a fix had been shipped within two days The post Flaw in popular VPN service may have exposed customer data appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Microsoft: 99.9 percent of hacked accounts didn’t use MFA
Only 11 percent of all enterprise accounts have multi-factor authentication enabled The post Microsoft: 99.9 percent of hacked accounts didn’t use MFA appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Microsoft: 99.9 percent of…
Microsoft: 99.9 percent of hacked accounts lacked MFA
Only 11 percent of all enterprise accounts have multi-factor authentication enabled The post Microsoft: 99.9 percent of hacked accounts lacked MFA appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Microsoft: 99.9 percent of hacked…
Virgin Media data leak exposes details of almost 1 million people
The misconfigured database was accessed by an unauthorized party on at least one occasion The post Virgin Media data leak exposes details of almost 1 million people appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
Week in security with Tony Anscombe
ESET research into the Guildma banking trojan – What can you do to stay safe from online fraud – Why become a cybersecurity professional The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT…
Virgin Media data leak exposes details of almost 1 million people
The misconfigured database was accessed by an unauthorized party on at least one occasion The post Virgin Media data leak exposes details of almost 1 million people appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Guildma: The Devil drives electric
The fourth installment of our occasional series demystifying Latin American banking trojans The post Guildma: The Devil drives electric appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Guildma: The Devil drives electric
Fraud Prevention Month: How to protect yourself from scams
ESET Chief Security Evangelist Tony Anscombe sat down with us to share his insights on how to avoid falling prey to online fraud The post Fraud Prevention Month: How to protect yourself from scams appeared first on WeLiveSecurity Advertise…
Voice assistants can be hacked with ultrasonic waves
With access to text messages and the ability to make fraudulent phone calls, attackers could wreak more damage than you’d think The post Voice assistants can be hacked with ultrasonic waves appeared first on WeLiveSecurity Advertise on IT Security…
Brave comes out on top in browser privacy study
By contrast, two web browsers share identifiers that are tied to the device hardware and so persist even across fresh installs The post Brave comes out on top in browser privacy study appeared first on WeLiveSecurity Advertise on IT…
5 reasons to consider a career in cybersecurity
From competitive salaries to ever-evolving job descriptions, there are myriad reasons why a cybersecurity career could be right for you The post 5 reasons to consider a career in cybersecurity appeared first on WeLiveSecurity Advertise on IT Security News.…
RSA 2020 – Is your machine learning/quantum computer lying to you?
And how would you know if the algorithm was tampered with? The post RSA 2020 – Is your machine learning/quantum computer lying to you? appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: RSA 2020…
Week in security with Tony Anscombe
ESET research uncovers a vulnerability in Wi-Fi chips – How to protect yourself against tax refund fraud – Clearview AI suffers a data breach The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT…
Firefox turns on DNS over HTTPS by default for US users
People in other parts of the world also have the option to flip on DNS encryption The post Firefox turns on DNS over HTTPS by default for US users appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Cyberbullying: How is it different from face‑to‑face bullying?
The digital age has added a whole new dimension to hurtful behavior, and we look at some of the key features that set in-person and online bullying apart The post Cyberbullying: How is it different from face‑to‑face bullying? appeared first…
Facial recognition company Clearview AI hit by data theft
The startup came under scrutiny after it emerged that it had amassed 3 billion photos for facial recognition software The post Facial recognition company Clearview AI hit by data theft appeared first on WeLiveSecurity Advertise on IT Security News.…
RSA 2020 – Hacking humans
What the human battle against biological viruses can teach us about fighting computer infections – and vice versa The post RSA 2020 – Hacking humans appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: RSA…
Did someone file your taxes before you?
With tax season – and tax scams – in full swing, here’s how fraudsters can steal your tax refund and how you can avoid becoming a victim The post Did someone file your taxes before you? appeared first on WeLiveSecurity…
Is bug hunting a viable career choice?
With earnings of top ethical hackers surpassing hundreds of thousands of dollars, some would say yes The post Is bug hunting a viable career choice? appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Is…
KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices
ESET researchers uncover a previously unknown security flaw allowing an adversary to decrypt some wireless network packets transmitted by vulnerable devices The post KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices appeared first on WeLiveSecurity Advertise on IT Security…
Is your phone listening to you?
Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid? A little test might speak a thousand words. The post Is your phone listening to you? appeared first…
Is your phone listening to you?
Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid? A little test might speak a thousand words. The post Is your phone listening to you? appeared first…
Week in security with Tony Anscombe
Hunting down Linux threats – The implications of DNS encryption for business security – MGM Resorts breach hits millions of people The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Up close and personal with Linux malware
What are the main security threats facing Linux? A Q&A with ESET Senior Malware Researcher Marc‑Etienne M.Léveillé, whose work has been instrumental in uncovering a number of malware strains hitting Linux servers. The post Up close and personal with Linux…
MGM Resorts data breach exposes details of 10.6 million guests
A number of celebrities, government officials and tech CEOs were also caught up in the incident The post MGM Resorts data breach exposes details of 10.6 million guests appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Linux and malware: Should you worry?
Malicious code is nothing to worry about on Linux, right? Hold your penguins. How Linux malware has gone from the sidelines to the headlines. The post Linux and malware: Should you worry? appeared first on WeLiveSecurity Advertise on IT…
What DNS encryption means for enterprise threat hunters
The dawn of the DNS over HTTPS era is putting business security and SOC teams to the challenge The post What DNS encryption means for enterprise threat hunters appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Sensitive plastic surgery photos exposed online
Other leaked records include videos, facial and body scans, as well as a range of patients’ personal data The post Sensitive plastic surgery photos exposed online appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
Plugin flaw leaves up to 200,000 WordPress sites at risk of attack
A fix is available, so you may want to make sure that you run the plugin’s latest version The post Plugin flaw leaves up to 200,000 WordPress sites at risk of attack appeared first on WeLiveSecurity Advertise on IT…
FC Barcelona Twitter account hacked – again
The same hackers have also got their mitts on social media accounts of other high-profile sporting targets The post FC Barcelona Twitter account hacked – again appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
Week in security with Tony Anscombe
How to spot and online dating scam – Almost 100 vulnerabilities fixed this month’s Patch Tuesday – Cyber-risks in esports The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
PayPal remains the most‑spoofed brand in phishing scams
WhatsApp also emerges as a favorite target for brand impersonation amid a general spike in social media phishing The post PayPal remains the most‑spoofed brand in phishing scams appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
How romance scammers break your heart – and your bank account
What are some of the most common warning signs that your online crush could be a dating scammer? The post How romance scammers break your heart – and your bank account appeared first on WeLiveSecurity Advertise on IT Security…
FBI: Cybercrime losses tripled over the last 5 years
On the upside, the Bureau recovered more than US$300 million in funds lost to online scams last year The post FBI: Cybercrime losses tripled over the last 5 years appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Almost 2 billion malware installs thwarted by Google Play Protect in 2019
That’s for apps from third-party marketplaces; another 790,000 policy-breaking apps were stopped from reaching Google Play The post Almost 2 billion malware installs thwarted by Google Play Protect in 2019 appeared first on WeLiveSecurity Advertise on IT Security News.…
Digital addiction: How to get your children off their screens
What are some of the common signs that your child may be a screen addict and what can you do to limit their screen time? The post Digital addiction: How to get your children off their screens appeared first on…
Microsoft Patch Tuesday fixes IE zero‑day and 98 other flaws
February may be the shortest month of the year, but it brings a bumper crop of patches The post Microsoft Patch Tuesday fixes IE zero‑day and 98 other flaws appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Competing in esports: 3 things to watch out for
If you’re looking to become a pro gamer, there are risks you shouldn’t play down The post Competing in esports: 3 things to watch out for appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Competing…
Week in security with Tony Anscombe
How digital forensics helps bring criminals to justice – Beef up your Facebook privacy – Take a quiz to test your phish-spotting prowess The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security…
Critical Bluetooth bug leaves Android users open to attack
Google releases a fix for the security hole that, if left unplugged, could allow attackers to run malicious code with no user interaction The post Critical Bluetooth bug leaves Android users open to attack appeared first on WeLiveSecurity Advertise…
Facebook now lets parents monitor their children’s chats
The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13 The post Facebook now lets parents monitor their children’s chats appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Facebook now lets you monitor your children’s chats
The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13 The post Facebook now lets you monitor your children’s chats appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
How to catch a cybercriminal: Tales from the digital forensics lab
What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice. The post How to catch a cybercriminal: Tales from the digital forensics lab appeared first on WeLiveSecurity Advertise on IT…
Electric scooters vulnerable to remote hacks
A helmet may not be enough to keep you safe(r) while riding an e-scooter The post Electric scooters vulnerable to remote hacks appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Electric scooters vulnerable to…
Facebook privacy settings: Protect your data with these tips
As Facebook turns 16, we look at how to keep your personal information safe from prying eyes The post Facebook privacy settings: Protect your data with these tips appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Would you get hooked by a phishing scam? Test yourself
As the tide of phishing attacks rises, improving your scam-spotting skills is never a bad idea The post Would you get hooked by a phishing scam? Test yourself appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Week in security with Tony Anscombe
ESET research into a campaign of the Winnti Group – The FBI warns of a job scam – What IoT legislation means for device makers and users The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …
Don’t get sacked! Scams to look out for this Super Bowl
As the teams prepare to battle it out on the gridiron, fraudsters are waiting to intercept your funds The post Don’t get sacked! Scams to look out for this Super Bowl appeared first on WeLiveSecurity Advertise on IT Security…
Winnti Group targeting universities in Hong Kong
ESET researchers uncover a new campaign of the Winnti Group targeting universities and using ShadowPad and Winnti malware The post Winnti Group targeting universities in Hong Kong appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
IoT laws are coming: What to expect
No more default logins on new IoT devices if UK legislators get their way The post IoT laws are coming: What to expect appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: IoT laws are…
Hackers blitz social media accounts of 15 NFL teams
The league and scores of teams were caught off-guard by the re-emergence of an infamous hacking group The post Hackers blitz social media accounts of 15 NFL teams appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
How to take charge of your Google privacy settings
Have you had a Google Privacy Checkup lately? If not, when better than international Data Privacy Day to audit the privacy of your Google account? The post How to take charge of your Google privacy settings appeared first on WeLiveSecurity…
Job hunting? Beware hiring scams using spoofed company websites
Cybercriminals are putting a new twist on an old trick The post Job hunting? Beware hiring scams using spoofed company websites appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Job hunting? Beware hiring scams…
Week in security with Tony Anscombe
Zero-day in Internet Explorer – Microsoft cloud leaked big – Dating apps accused of sharing user data with advertisers The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Google: Flaws in Apple’s privacy tool could enable tracking
Safari’s anti-tracking feature could apparently give access to users’ browsing habits The post Google: Flaws in Apple’s privacy tool could enable tracking appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Google: Flaws in Apple’s…
Microsoft exposed 250 million customer support records
Databases containing 14 years’ worth of customer support logs were publicly accessible with no password protection The post Microsoft exposed 250 million customer support records appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Microsoft…
Dating apps share personal data with advertisers, study says
Some of the most popular dating services may be violating GDPR or other privacy laws The post Dating apps share personal data with advertisers, study says appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article:…
3 ways to browse the web anonymously
Are you looking to hide in plain sight? Here’s a rundown of three options for becoming invisible online The post 3 ways to browse the web anonymously appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
New Internet Explorer zero‑day remains unpatched
You may want to implement a workaround or stop using the browser altogether, at least until Microsoft issues a a fix The post New Internet Explorer zero‑day remains unpatched appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Week in security with Tony Anscombe
Microsoft plugs a serious hole in Windows – Your options after Windows 7 end of life – iPhones as security keys for Google accounts The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT…
FBI shuts down website selling billions of stolen records
A subscription to the trove of personal details could be had for as little as $2 The post FBI shuts down website selling billions of stolen records appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
You can now turn your iPhone into a Google security key
And it doesn’t require much more than downloading a dedicated app The post You can now turn your iPhone into a Google security key appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: You can…
Cyberawareness in Australia: The good and the bad
An ESET-commissioned survey sheds light on the browsing habits of Australians and how they protect themselves online The post Cyberawareness in Australia: The good and the bad appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Google to end support for third‑party cookies in Chrome
The company will also soon launch anti-fingerprinting measures aimed at detecting and mitigating covert tracking and workarounds The post Google to end support for third‑party cookies in Chrome appeared first on WeLiveSecurity Advertise on IT Security News. Read the…
Microsoft patches severe Windows flaw after tip‑off from NSA
The US intelligence agency expects attackers to waste no time in developing tools aimed at exploiting the vulnerability The post Microsoft patches severe Windows flaw after tip‑off from NSA appeared first on WeLiveSecurity Advertise on IT Security News. Read…
Millions of modems at risk of remote hijacking
Multiple cable modem models from various manufacturers found vulnerable to takeover attacks The post Millions of modems at risk of remote hijacking appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Millions of modems at…
Windows 7 end of life: Time to move on
Today, Microsoft is officially pulling the plug on its support for Windows 7. What’s your plan? The post Windows 7 end of life: Time to move on appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
5 major US wireless carriers vulnerable to SIM swapping attacks
When it comes to protection against this insidious type of scam, the telcos’ authentication procedures leave a lot be desired, a study finds The post 5 major US wireless carriers vulnerable to SIM swapping attacks appeared first on WeLiveSecurity …
Major US wireless carriers vulnerable to SIM swapping attacks
When it comes to protection against this insidious type of scam, the telcos’ authentication procedures leave a lot be desired, a study finds The post Major US wireless carriers vulnerable to SIM swapping attacks appeared first on WeLiveSecurity Advertise…
Week in security with Tony Anscombe
Some takeaways from CES 2020 – Firefox update plugs a zero-day – Facebook cracks down on deepfakes The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Week…
Connected cars: How to improve their connection to cybersecurity
With software becoming more important than ever, how can engaging the security industry help make the road ahead less winding? The post Connected cars: How to improve their connection to cybersecurity appeared first on WeLiveSecurity Advertise on IT Security…
Mozilla rushes out patch for Firefox zero‑day
The US cybersecurity agency warns that the critical vulnerability could allow attackers to take control of people’s computers The post Mozilla rushes out patch for Firefox zero‑day appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
CES – Taking a smart city for a test drive
No one has a road map for securing a connected city – but there should be a whole atlas of such maps The post CES – Taking a smart city for a test drive appeared first on WeLiveSecurity Advertise…
Facebook bans deepfakes but not all altered content
Footage defined as parody or satire will be permitted, as the social network isn’t slamming the door on all types of manipulated media The post Facebook bans deepfakes but not all altered content appeared first on WeLiveSecurity Advertise on…
Week in security with Tony Anscombe
ESET experts offered some valuable advice this week to help keep your digital life secure in the new year The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete…
Google disables Xiaomi smart home integration after camera bug
A Xiaomi security camera owner reports receiving random images from strangers’ homes The post Google disables Xiaomi smart home integration after camera bug appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Google disables Xiaomi…
Google disables Xiaomi smart home integration
A Xiaomi camera owner reports receiving random images from strangers’ homes The post Google disables Xiaomi smart home integration appeared first on WeLiveSecurity Advertise on IT Security News. Read the complete article: Google disables Xiaomi smart home integration
Simple steps to protect yourself against identity theft
As we enter the New Year, be sure to keep up, or adopt, these good data security habits to avoid identity theft The post Simple steps to protect yourself against identity theft appeared first on WeLiveSecurity Advertise on IT…