Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Alexa, who else is listening?
Category: welivesecurity
ESET Threat Report T3 2022
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T3 2022 appeared first on WeLiveSecurity This article has been indexed…
Into the void: Your tech and security in digital darkness
No internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications of being plunged into digital darkness. The post Into the void: Your tech and security in digital darkness appeared first on WeLiveSecurity This article…
Online safety laws: What’s in store for children’s digital playgrounds?
As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm The post Online safety laws: What’s in store for children’s digital playgrounds? appeared first on…
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe
As our latest APT Activity Report makes abundantly clear, the threat of cyberespionage and stealthy attacks remains very real The post Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity…
Is that survey real or fake? How to spot a survey scam
“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any surveys online The post Is that survey real or fake? How to spot a…
Less is more: Conquer your digital clutter before it conquers you
Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security The post Less is more: Conquer your digital clutter before it conquers you appeared first on WeLiveSecurity This article…
ESET APT Activity Report T3 2022
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post ESET APT Activity Report T3 2022 appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
SwiftSlicer: New destructive wiper malware strikes Ukraine
Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country The post SwiftSlicer: New destructive wiper malware strikes Ukraine appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: SwiftSlicer: New destructive…
Are you in control of your personal data? – Week in security with Tony Anscombe
Data Privacy Week is a reminder to protect your data – all year round. Here are three privacy-boosting habits you can start today. The post Are you in control of your personal data? – Week in security with Tony Anscombe…
Why your data is more valuable than you may realize
The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think The post Why your data is more valuable than you may realize appeared first on WeLiveSecurity This article has been…
Mastodon vs. Twitter: Know the differences
Looking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare to each other. The post Mastodon vs. Twitter: Know the differences appeared first on WeLiveSecurity This article has been…
5 valuable skills your children can learn by playing video games
Gaming can help your children build and sharpen a range of life skills that will stand them in good stead in the future The post 5 valuable skills your children can learn by playing video games appeared first on WeLiveSecurity…
Hybrid play: Leveling the playing field in online video gaming and beyond
Does VALORANT’s approach to cheating signal a turning point in how we deal with the continued hacks afflicting our hybrid world of work and play? The post Hybrid play: Leveling the playing field in online video gaming and beyond appeared…
Ransomware payments down 40% in 2022 – Week in security with Tony Anscombe
Ransomware revenue plunges to $456 million in 2022 as more victims refuse to pay up. Here’s what to make of the trend. The post Ransomware payments down 40% in 2022 – Week in security with Tony Anscombe appeared first on…
Tech support scammers are still at it: Here’s what to look out for in 2023
Hello, is it me you’re looking for? Fraudsters still want to help you fix a computer problem you never had in the first place. The post Tech support scammers are still at it: Here’s what to look out for in…
Top 10 Venmo scams – and how to stay safe
Don’t be the next victim – here’s what to know about some of the most common tricks that scammers use on the payment app The post Top 10 Venmo scams – and how to stay safe appeared first on WeLiveSecurity…
Hybrid commerce: Blurring the lines between business and pleasure
It is now acceptable to find a job on a dating app! The post Hybrid commerce: Blurring the lines between business and pleasure appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Hybrid commerce:…
APT group trojanizes Telegram app – Week in security with Tony Anscombe
StrongPity’s backdoor is fitted with various spying features and can record phone calls, collect texts, and gather call logs and contact lists The post APT group trojanizes Telegram app – Week in security with Tony Anscombe appeared first on WeLiveSecurity…
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit
ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA The post Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Now you can legally repair your tech – sort of
A new law portends a future where (we hope) it will be easier for us all to repair, fix, upgrade, and just tinker with things we already own The post Now you can legally repair your tech – sort of…
StrongPity espionage campaign targeting Android users
ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version The post StrongPity espionage campaign targeting Android users appeared first…
Hybrid work: Turning business platforms into preferred social spaces
Hybrid work and hybrid play now merge into hybrid living, but where is the line between the two? Is there one? The post Hybrid work: Turning business platforms into preferred social spaces appeared first on WeLiveSecurity This article has been…
Cracked it! Highlights from KringleCon 5: Golden Rings
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum’s foul plan and recover the five golden rings The post Cracked it! Highlights from…
Ransomware target list – Week in security with Tony Anscombe
Why schools, hospitals, local governments and other public sector organizations are in a sweet spot for ransomware attacks The post Ransomware target list – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed from…
The doctor will see you now … virtually: Tips for a safe telehealth visit
Are your virtual doctor visits private and secure? Here’s what to know about, and how to prepare for, connecting with a doctor from the comfort of your home. The post The doctor will see you now … virtually: Tips for…
Gaming: How much is too much for our children?
With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity This…
The world’s most common passwords: What to do if yours is on the list
Do you use any of these extremely popular – and eminently hackable – passwords? If so, we have a New Year’s resolution for you. The post The world’s most common passwords: What to do if yours is on the list…