Category: welivesecurity

API security moves mainstream

The heavyweights are now moving into API security, cementing it as “A Thing” The post API security moves mainstream appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: API security moves mainstream

Do back offices mean backdoors?

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture The post Do back offices mean backdoors? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Do…

5 ways cybercriminals steal credit card details

Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity This article…

Crypto mixers: What are they and how are they used?

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity…

RSA – APIs, your organization’s dedicated backdoors

This article has been indexed from WeLiveSecurity API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly The post RSA – APIs, your organization’s dedicated backdoors appeared first on WeLiveSecurity Read the original…

RSA – Creepy real‑world edition

This article has been indexed from WeLiveSecurity Digital fiddling somehow got mixed up in a real war The post RSA – Creepy real‑world edition appeared first on WeLiveSecurity Read the original article: RSA – Creepy real‑world edition

RSA – Spot the real fake

This article has been indexed from WeLiveSecurity How erring on the side of privacy might ultimately save you from chasing down a virtual robot of you doing the bidding of a scammer The post RSA – Spot the real fake…

ESET Threat Report T 1 2022

This article has been indexed from WeLiveSecurity A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T 1 2022 appeared first…

Talking to children about the internet: A kid’s perspective

This article has been indexed from WeLiveSecurity A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet The post Talking to children about the internet: A kid’s perspective appeared first on WeLiveSecurity Read…

Cybersecurity: A global problem that requires a global answer

This article has been indexed from WeLiveSecurity New and exacerbated cyber-risks following Russia’s invasion of Ukraine are fueling a new urgency towards enhancing resilience The post Cybersecurity: A global problem that requires a global answer appeared first on WeLiveSecurity Read…

5 reasons why GDPR was a milestone for data protection

This article has been indexed from WeLiveSecurity The landmark regulation changed everyone’s mindset on how companies worldwide collect and use the personal data of EU citizens The post 5 reasons why GDPR was a milestone for data protection appeared first…

Common NFT scams and how to avoid them

This article has been indexed from WeLiveSecurity As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the industry. The post Common NFT scams and how…

Sandworm deploys new version of ArguePatch malware loader

This article has been indexed from WeLiveSecurity ArguePatch was previously used in the Industroyer2 and CaddyWiper attacks The post Sandworm deploys new version of ArguePatch malware loader appeared first on WeLiveSecurity Read the original article: Sandworm deploys new version of…

Fake news – why do people believe it?

This article has been indexed from WeLiveSecurity In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real The post Fake news – why do people believe…

The downside of ‘debugging’ ransomware

This article has been indexed from WeLiveSecurity The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code The post The downside of ‘debugging’ ransomware…

10 reasons why we fall for scams

This article has been indexed from WeLiveSecurity The ‘it won’t happen to me’ mindset leaves you unprepared – here are some common factors that put any of us at risk of online fraud The post 10 reasons why we fall…

3 most dangerous types of Android malware

This article has been indexed from WeLiveSecurity Here’s what you should know about some of the nastiest mobile malware – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely The post…

What’s behind the record‑high number of zero days?

This article has been indexed from WeLiveSecurity Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity The post What’s behind the record‑high number of zero days?…

Is your Lenovo laptop vulnerable to cyberattack?

This article has been indexed from WeLiveSecurity Here’s what to know about vulnerabilities in more than 100 Lenovo consumer laptop models and what you can do right away to stay safe – all in under three minutes The post Is…

We’re going on Tor

This article has been indexed from WeLiveSecurity If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Under the hood of Wslink’s VM – The energy sector & cyber-risk – SMB cybersecurity survival tips The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the original article:…

Cybersecurity survival tips for small businesses: 2022 edition

This article has been indexed from WeLiveSecurity How can businesses that lack the resources and technological expertise of large organizations hold the line against cybercriminals? The post Cybersecurity survival tips for small businesses: 2022 edition appeared first on WeLiveSecurity Read…

Under the hood of Wslink’s multilayered virtual machine

This article has been indexed from WeLiveSecurity ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques The post Under the hood of Wslink’s multilayered…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET discovers Mustang Panda’s Hodur trojan – Crypto malware targeting Android and iOS users alike – Nation-state digital deterrent The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the…

Mustang Panda’s Hodur: Old tricks, new Korplug variant

This article has been indexed from WeLiveSecurity ESET researchers have discovered Hodur, a previously undocumented Korplug variant spread by Mustang Panda, that uses phishing lures referencing current events in Europe, including the invasion of Ukraine The post Mustang Panda’s Hodur:…

Sandworm: A tale of disruption told anew

This article has been indexed from WeLiveSecurity As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again The post Sandworm: A tale of disruption told anew appeared first on WeLiveSecurity Read the…

Defending the data center: The time to act is now

This article has been indexed from WeLiveSecurity Cyberattacks against data centers may ultimately be everyone’s problem – how prepared are their operators for the heightened risk of cyber-assaults? The post Defending the data center: The time to act is now…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET Research finds another data wiper in Ukraine – Securing data centers against threats – A cultural divide between the military and Silicon Valley The post Week in security with Tony Anscombe appeared…

US military vs. Silicon Valley – a cultural divide

This article has been indexed from WeLiveSecurity The US military knows it needs to speed up technology adoption through optimization, something at the heart of Silicon Valley culture The post US military vs. Silicon Valley – a cultural divide appeared…

CaddyWiper: New wiper malware discovered in Ukraine

This article has been indexed from WeLiveSecurity This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations The post CaddyWiper: New wiper malware discovered in Ukraine…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Gray zone conflicts in cyberspace – Can you identify fake news? – Top cybersecurity threats for the healthcare sector The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity New malware targeting organizations in Ukraine – How organizations can improve their cyber-resiliency – Scammers taking advantage of the crisis The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read…

Innovation and the Roots of Progress

This article has been indexed from WeLiveSecurity If you look back at the long arc of history, it’s clear that one of the most crucial drivers of real progress in society is innovation The post Innovation and the Roots of…

Beware of charity scams exploiting war in Ukraine

This article has been indexed from WeLiveSecurity Looking to help people in Ukraine? Donate wisely – do your research first so you give without getting scammed The post Beware of charity scams exploiting war in Ukraine appeared first on WeLiveSecurity…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity HermeticWiper takes aim at Ukraine – The climate solutions we need to transform society – Preventing kids from getting involved in cybercrime The post Week in security with Tony Anscombe appeared first on…

HermeticWiper: New data‑wiping malware hits Ukraine

This article has been indexed from WeLiveSecurity Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites The post HermeticWiper: New data‑wiping malware hits Ukraine appeared first on WeLiveSecurity…

Technology, Progress, and Climate

This article has been indexed from WeLiveSecurity The climate solutions we need to transform every sector are here. The question is: what role will you play in this transformation? You, your community, your business, your government? The post Technology, Progress,…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity What does progress in technology mean? – IRS makes a U-turn on facial recognition but questions remain – What retailers need to know about cyberthreats The post Week in security with Tony Anscombe…