The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK This article has been indexed from WeLiveSecurity Read the original article: Blackwood hijacks software updates to…
Category: welivesecurity
Assessing and mitigating supply chain cybersecurity risks
Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management This article has been indexed from WeLiveSecurity Read the original article: Assessing and mitigating supply chain…
Why many CISOs consider quitting – Week in security with Tony Anscombe
The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings This article has been indexed from WeLiveSecurity Read the original article: Why many CISOs consider quitting…
Virtual kidnapping: How to see through this terrifying scam
Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims This article has been indexed from WeLiveSecurity Read the original article: Virtual kidnapping: How to see through this…
Is Temu safe? What to know before you ‘shop like a billionaire’
Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal This article has been indexed from WeLiveSecurity Read the original article:…
The 7 deadly cloud security sins and how SMBs can do things better
By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk This article has been indexed from WeLiveSecurity Read the original article: The 7 deadly cloud security…
Lessons from SEC’s X account hack – Week in security with Tony Anscombe
The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC’s X account right ahead of the much-anticipated decision about Bitcoin ETFs This article has been indexed from WeLiveSecurity…
Attack of the copycats: How fake messaging apps and app mods could bite you
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride. This article has been indexed from WeLiveSecurity Read the original article: Attack of the copycats: How fake messaging apps and…
Love is in the AI: Finding love online takes on a whole new meaning
Is AI companionship the future of not-so-human connection – and even the cure for loneliness? This article has been indexed from WeLiveSecurity Read the original article: Love is in the AI: Finding love online takes on a whole new meaning
Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe
What are some of the key cybersecurity trends that people and organizations should have on their radars this year? This article has been indexed from WeLiveSecurity Read the original article: Cybersecurity trends and challenges to watch out for in 2024…
Lost and found: How to locate your missing devices and more
Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy This article has been indexed…
Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe
How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET’s latest Threat Report This article has been indexed from WeLiveSecurity Read the original…
Safeguard the joy: 10 tips for securing your shiny new device
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly This article has been indexed from WeLiveSecurity Read the…
New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes This article has been indexed from WeLiveSecurity Read the original article: New iOS feature to thwart…
Black Hat Europe 2023: Should we regulate AI?
ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past? This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2023: Should we regulate AI?
Black Hat Europe 2023: The past could return to haunt you
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks. This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2023: The past could return to haunt you
Surge in deceptive loan apps – Week in security with Tony Anscombe
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi This article has been indexed from WeLiveSecurity Read the original article: Surge in deceptive loan apps – Week in…
To tap or not to tap: Are NFC payments safer?
Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods? This article has been indexed from WeLiveSecurity Read the original article: To tap or not to tap: Are NFC payments safer?
Navigating privacy: Should we put the brakes on car tracking?
Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable? This article has been indexed from WeLiveSecurity Read the original article: Navigating privacy: Should we put…
Teaching appropriate use of AI tech – Week in security with Tony Anscombe
Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology This article has been indexed from WeLiveSecurity Read the original article: Teaching appropriate use of AI tech…
Very precisely lost – GPS jamming
The technology is both widely available and well developed, hence it’s also poised to proliferate – especially in the hands of those wishing ill This article has been indexed from WeLiveSecurity Read the original article: Very precisely lost – GPS…
Telekopye’s tricks of the trade – Week in security with Tony Anscombe
ESET’s research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online This article has been indexed from WeLiveSecurity Read the original article: Telekopye’s tricks of…
Telekopye: Chamber of Neanderthals’ secrets
Insight into groups operating Telekopye bots that scam people in online marketplaces This article has been indexed from WeLiveSecurity Read the original article: Telekopye: Chamber of Neanderthals’ secrets
Your voice is my password
AI-driven voice cloning can make things far too easy for scammers – I know because I’ve tested it so that you don’t have to learn about the risks the hard way. This article has been indexed from WeLiveSecurity Read the…
Fuel for thought: Can a driverless car get arrested?
What happens when problems caused by autonomous vehicles are not the result of errors, but the result of purposeful attacks? This article has been indexed from WeLiveSecurity Read the original article: Fuel for thought: Can a driverless car get arrested?
Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe
An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause This article has been indexed from WeLiveSecurity Read the…
Cyber threat intelligence: Getting on the front foot against adversaries
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk This article has been indexed from WeLiveSecurity Read the original article: Cyber threat…
Spyware disguised as a news app – Week in security with Tony Anscombe
The Urdu version of the Hunza News website offers readers the option to download an Android app – little do they know that the app is actually spyware This article has been indexed from WeLiveSecurity Read the original article: Spyware…
Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan
ESET researchers discovered Kamran, previously unknown malware, which spies on Urdu-speaking readers of Hunza News This article has been indexed from WeLiveSecurity Read the original article: Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan
The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe
Various questions linger following the botnet’s sudden and deliberate demise, including: who actually initiated it? This article has been indexed from WeLiveSecurity Read the original article: The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe
Who killed Mozi? Finally putting the IoT zombie botnet in its grave
How ESET Research found a kill switch that had been used to take down one of the most prolific botnets out there This article has been indexed from WeLiveSecurity Read the original article: Who killed Mozi? Finally putting the IoT…
Roundcube Webmail servers under attack – Week in security with Tony Anscombe
The zero-day exploit deployed by the Winter Vivern APT group only requires that the target views a specially crafted message in a web browser This article has been indexed from WeLiveSecurity Read the original article: Roundcube Webmail servers under attack…
ESET APT Activity Report Q2–Q3 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2–Q3 2023
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible This article has been indexed from WeLiveSecurity Read the original article: Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
Spearphishing targets in Latin America – Week in security with Tony Anscombe
ESET’s analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including those targeting enterprises and governments This article has been indexed from WeLiveSecurity Read the original article: Spearphishing targets in Latin…
Strengthening the weakest link: top 3 security awareness topics for your employees
Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats This article has been indexed from WeLiveSecurity Read the original article: Strengthening the weakest link: top 3 security awareness topics for…
Better safe than sorry: 10 tips to build an effective business backup strategy
How robust backup practices can help drive resilience and improve cyber-hygiene in your company This article has been indexed from WeLiveSecurity Read the original article: Better safe than sorry: 10 tips to build an effective business backup strategy
Staying on top of security updates – Week in security with Tony Anscombe
Why keeping software up to date is a crucial security practice that should be followed by everyone from individual users to SMBs and large enterprises This article has been indexed from WeLiveSecurity Read the original article: Staying on top of…
Virus Bulletin – building digital armies
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack This article has been indexed from WeLiveSecurity Read the original article: Virus Bulletin…
Virus Bulletin PUA – a love letter
Late nights at VB2023 featured intriguing interactions between security experts and the somewhat enigmatic world of grayware purveyors This article has been indexed from WeLiveSecurity Read the original article: Virus Bulletin PUA – a love letter
Fake friends and followers on social media – and how to spot them
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them. This article has been indexed from WeLiveSecurity Read the original article:…
DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine This article has been indexed from WeLiveSecurity Read the original article: DinodasRAT used against governmental entity in…
Playing your part in building a safer digital world: Why cybersecurity matters
In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being This article has been indexed from WeLiveSecurity Read the original article: Playing your part in building a safer digital world:…
How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe
During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan This article has been indexed from WeLiveSecurity Read the original article: How Lazarus impersonated Meta to attack a target in Spain –…
ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe
Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups This article has been indexed from WeLiveSecurity Read the original article: ESET’s cutting-edge threat research at LABScon – Week…
Ballistic Bobcat’s Sponsor backdoor – Week in security with Tony Anscombe
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States This article has been indexed from WeLiveSecurity…
Read it right! How to spot scams on Reddit
Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as “the front page of the Internet”? This article has been indexed from WeLiveSecurity Read the original…
Will you give X your biometric data? – Week in security with Tony Anscombe
The update to X’s privacy policy has sparked some questions among privacy and security folks, including how long X will retain users’ biometric information and how the data will be stored and secured This article has been indexed from WeLiveSecurity…
Staying ahead of threats: 5 cybercrime trends to watch
New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought This article has been indexed from WeLiveSecurity Read the original article: Staying ahead of threats: 5 cybercrime…
Fake Signal and Telegram apps – Week in security with Tony Anscombe
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites This article has been indexed from WeLiveSecurity Read the original article: Fake Signal and Telegram apps –…
How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe
ESET researchers uncover a Telegram bot that enables even less tech-savvy scammers to defraud people out of their money This article has been indexed from WeLiveSecurity Read the original article: How a Telegram bot helps scammers target victims – Week…
Scarabs colon-izing vulnerable servers
Analysis of Spacecolon, a toolset used to deploy Scarab ransomware on vulnerable servers, and its operators, CosmicBeetle This article has been indexed from WeLiveSecurity Read the original article: Scarabs colon-izing vulnerable servers
Evacuation of 30,000 hackers – Week in security with Tony Anscombe
DEF CON, the annual hacker’s convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the convention due to a bomb threat. This article has been indexed from WeLiveSecurity Read the original article: Evacuation of 30,000 hackers –…
DEF CON 31: US DoD urges hackers to go and hack ‘AI’
The limits of current AI need to be tested before we can rely on their output This article has been indexed from WeLiveSecurity Read the original article: DEF CON 31: US DoD urges hackers to go and hack ‘AI’
DEF CON 31: Robot vacuums may be doing more than they claim
When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision. This article has been indexed from WeLiveSecurity Read the original article: DEF CON 31: Robot vacuums may be doing more than…
Check cybersecurity pre-invest – Week in security with Tony Anscombe
When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules. This article has been indexed from WeLiveSecurity Read the original article: Check cybersecurity pre-invest – Week in security…
Is backdoor access oppressive? – Week in security with Tony Anscombe
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK? This article has been indexed from WeLiveSecurity Read the original article: Is backdoor access oppressive? – Week in security…
Dear all, What are some common subject lines in phishing emails?
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency. This article has been indexed from WeLiveSecurity Read the original article: Dear all, What are some common subject lines in phishing emails?
Gathering dust and data: How robotic vacuums can spy on you.
Mitigate the risk of data leaks with a careful review of the product and the proper settings. This article has been indexed from WeLiveSecurity Read the original article: Gathering dust and data: How robotic vacuums can spy on you.
Dear all! What are some common subject lines in phishing emails?
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency. This article has been indexed from WeLiveSecurity Read the original article: Dear all! What are some common subject lines in phishing emails?
ChatGPT, will you be my Valentine?
Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot that the world has fallen in love with so badly. The post ChatGPT, will you be my Valentine? appeared…
Confident cybersecurity means fewer headaches for SMBs
Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts The post Confident cybersecurity means fewer headaches for SMBs appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the…
Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe
What is behind the drop in ransomware and what should still be done for containing the ransomware scourge? The post Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity This…
Alexa, who else is listening?
Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Alexa, who else is listening?
ESET Threat Report T3 2022
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T3 2022 appeared first on WeLiveSecurity This article has been indexed…
Into the void: Your tech and security in digital darkness
No internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications of being plunged into digital darkness. The post Into the void: Your tech and security in digital darkness appeared first on WeLiveSecurity This article…
Online safety laws: What’s in store for children’s digital playgrounds?
As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm The post Online safety laws: What’s in store for children’s digital playgrounds? appeared first on…
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe
As our latest APT Activity Report makes abundantly clear, the threat of cyberespionage and stealthy attacks remains very real The post Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity…
Is that survey real or fake? How to spot a survey scam
“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any surveys online The post Is that survey real or fake? How to spot a…
Less is more: Conquer your digital clutter before it conquers you
Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security The post Less is more: Conquer your digital clutter before it conquers you appeared first on WeLiveSecurity This article…
ESET APT Activity Report T3 2022
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post ESET APT Activity Report T3 2022 appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
SwiftSlicer: New destructive wiper malware strikes Ukraine
Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country The post SwiftSlicer: New destructive wiper malware strikes Ukraine appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: SwiftSlicer: New destructive…
Are you in control of your personal data? – Week in security with Tony Anscombe
Data Privacy Week is a reminder to protect your data – all year round. Here are three privacy-boosting habits you can start today. The post Are you in control of your personal data? – Week in security with Tony Anscombe…
Why your data is more valuable than you may realize
The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think The post Why your data is more valuable than you may realize appeared first on WeLiveSecurity This article has been…
Mastodon vs. Twitter: Know the differences
Looking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare to each other. The post Mastodon vs. Twitter: Know the differences appeared first on WeLiveSecurity This article has been…
5 valuable skills your children can learn by playing video games
Gaming can help your children build and sharpen a range of life skills that will stand them in good stead in the future The post 5 valuable skills your children can learn by playing video games appeared first on WeLiveSecurity…
Hybrid play: Leveling the playing field in online video gaming and beyond
Does VALORANT’s approach to cheating signal a turning point in how we deal with the continued hacks afflicting our hybrid world of work and play? The post Hybrid play: Leveling the playing field in online video gaming and beyond appeared…
Ransomware payments down 40% in 2022 – Week in security with Tony Anscombe
Ransomware revenue plunges to $456 million in 2022 as more victims refuse to pay up. Here’s what to make of the trend. The post Ransomware payments down 40% in 2022 – Week in security with Tony Anscombe appeared first on…
Tech support scammers are still at it: Here’s what to look out for in 2023
Hello, is it me you’re looking for? Fraudsters still want to help you fix a computer problem you never had in the first place. The post Tech support scammers are still at it: Here’s what to look out for in…
Top 10 Venmo scams – and how to stay safe
Don’t be the next victim – here’s what to know about some of the most common tricks that scammers use on the payment app The post Top 10 Venmo scams – and how to stay safe appeared first on WeLiveSecurity…
Hybrid commerce: Blurring the lines between business and pleasure
It is now acceptable to find a job on a dating app! The post Hybrid commerce: Blurring the lines between business and pleasure appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Hybrid commerce:…
APT group trojanizes Telegram app – Week in security with Tony Anscombe
StrongPity’s backdoor is fitted with various spying features and can record phone calls, collect texts, and gather call logs and contact lists The post APT group trojanizes Telegram app – Week in security with Tony Anscombe appeared first on WeLiveSecurity…
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit
ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA The post Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Now you can legally repair your tech – sort of
A new law portends a future where (we hope) it will be easier for us all to repair, fix, upgrade, and just tinker with things we already own The post Now you can legally repair your tech – sort of…
StrongPity espionage campaign targeting Android users
ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version The post StrongPity espionage campaign targeting Android users appeared first…
Hybrid work: Turning business platforms into preferred social spaces
Hybrid work and hybrid play now merge into hybrid living, but where is the line between the two? Is there one? The post Hybrid work: Turning business platforms into preferred social spaces appeared first on WeLiveSecurity This article has been…
Cracked it! Highlights from KringleCon 5: Golden Rings
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum’s foul plan and recover the five golden rings The post Cracked it! Highlights from…
Ransomware target list – Week in security with Tony Anscombe
Why schools, hospitals, local governments and other public sector organizations are in a sweet spot for ransomware attacks The post Ransomware target list – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed from…
The doctor will see you now … virtually: Tips for a safe telehealth visit
Are your virtual doctor visits private and secure? Here’s what to know about, and how to prepare for, connecting with a doctor from the comfort of your home. The post The doctor will see you now … virtually: Tips for…
Gaming: How much is too much for our children?
With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity This…
The world’s most common passwords: What to do if yours is on the list
Do you use any of these extremely popular – and eminently hackable – passwords? If so, we have a New Year’s resolution for you. The post The world’s most common passwords: What to do if yours is on the list…
Cybersecurity trends and challenges to look out for in 2023
What are some of the key cybersecurity trends and themes that organizations should have on their radars in 2023? The post Cybersecurity trends and challenges to look out for in 2023 appeared first on WeLiveSecurity This article has been indexed…
2022 in review: 10 of the year’s biggest cyberattacks
The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022 The post 2022 in review: 10…
‘Tis the season for gaming: Keeping children safe (and parents sane)
It’s all fun and games over the holidays, but is your young gamer safe from the darker side of the action? The post ‘Tis the season for gaming: Keeping children safe (and parents sane) appeared first on WeLiveSecurity This article…
How to set up parental controls on your child’s new smartphone
Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls The post How to set up parental controls on your child’s new smartphone appeared first on WeLiveSecurity This article…
MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe
The group’s proprietary backdoor LODEINFO delivers additional malware, exfiltrates credentials, and steals documents and emails The post MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed…
Help! My kid has asked Santa for a smartphone
The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them use their new gadget safely and responsibly. The post Help! My kid has asked Santa for a smartphone…
Traveling for the holidays? Stay cyber‑safe with these tips
Holiday travel is back with a vengeance this year. Set yourself up for a cyber-safe and hassle-free trip with our checklist. The post Traveling for the holidays? Stay cyber‑safe with these tips appeared first on WeLiveSecurity This article has been…
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities
ESET researchers discovered a spearphishing campaign targeting Japanese political entities a few weeks before the House of Councillors elections, and in the process uncovered a previously undescribed MirrorFace credential stealer The post Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities…
Top tips for security‑ and privacy‑enhancing holiday gifts
Think outside the (gift) box. Here are a few ideas for security and privacy gifts to get for your relatives – or even for yourself. Some don’t cost a penny! The post Top tips for security‑ and privacy‑enhancing holiday gifts…