Category: welivesecurity

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Why deleting your personal data from social media may be impossible – How do you reset your face after a data breach? – The perils of working from a hotel…

Had your face stolen lately?

Read the original article: Had your face stolen lately? It’s easy to reset your password or PIN after a data breach. But reset your face? Not so much. The post Had your face stolen lately? appeared first on WeLiveSecurity  …

US gov’t warns against paying off ransomware attackers

Read the original article: US gov’t warns against paying off ransomware attackers Companies facilitating ransomware payments run the risk of facing stern penalties for violating US regulations The post US gov’t warns against paying off ransomware attackers appeared first on…

5 steps to secure your connected devices

Read the original article: 5 steps to secure your connected devices As we steadily adopt smart devices into our lives, we shouldn’t forget about keeping them secured and our data protected The post 5 steps to secure your connected devices…

5 tips for better Google Drive security

Read the original article: 5 tips for better Google Drive security As cloud storage solutions are becoming more and more popular, we look at several simple steps you can take to secure your files on Google Drive The post 5…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Bug let hijack Firefox browsers on other phones over Wi-Fi – NIST’s new tool to help firms understand why staff fall for phishing – Almost 200 arrested in dark web…

179 arrested in massive dark web bust

Read the original article: 179 arrested in massive dark web bust The sting is said to be the US Government’s largest operation targeting crime in the internet’s seedy underbelly The post 179 arrested in massive dark web bust appeared first…

5 ways cybercriminals can try to extort you

Read the original article: 5 ways cybercriminals can try to extort you What are some common strategies cybercriminals employ in extortion schemes and how can you mitigate the chances of falling victim to a cyber-shakedown? The post 5 ways cybercriminals…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Zoom now supports two-factor authentication. A cyber attack, which affected 14 inboxes belonging to Quebec’s Department of Justice, was confirmed by ESET researchers. The post Week in security with Tony…

Emotet strikes Quebec’s Department of Justice: An ESET Analysis

Read the original article: Emotet strikes Quebec’s Department of Justice: An ESET Analysis The cyber attack affects 14 inboxes belonging to the Department of Justice was confirmed by ESET researchers.  The post Emotet strikes Quebec’s Department of Justice: An ESET Analysis appeared first on WeLiveSecurity  …

Zoom makes 2FA available for all its users

Read the original article: Zoom makes 2FA available for all its users Zoom now supports phone calls, text messages and authentication apps as forms of two-factor authentication   The post Zoom makes 2FA available for all its users appeared first on…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe ESET researchers have discovered and analyzed CDRThief, a malware that targets Voice over IP (VoIP) softswitches. Righard Zwienenberg deep in the lead-offering business and invites us to take steps to…

Who is calling? CDRThief targets Linux VoIP softswitches

Read the original article: Who is calling? CDRThief targets Linux VoIP softswitches ESET researchers have discovered and analyzed malware that targets Voice over IP (VoIP) softswitches. The post Who is calling? CDRThief targets Linux VoIP softswitches appeared first on WeLiveSecurity…

Lead‑offering business booming as usual!

Read the original article: Lead‑offering business booming as usual! …but there are no conferences or exhibitions??? The post Lead‑offering business booming as usual! appeared first on WeLiveSecurity   Advertise on IT Security News. Read the original article: Lead‑offering business booming…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe ESET research dissects KryptoCibule malware family – Why close unused accounts rather than just remove apps – Microsoft’s new deepfake detector The post Week in security with Tony Anscombe appeared…

Houseparty – should I stay or should I go now?

Read the original article: Houseparty – should I stay or should I go now? What’s the benefit of deleting your Houseparty – or any other unused – account, rather than just uninstalling the app? The post Houseparty – should I…

Microsoft debuts deepfake detection tool

Read the original article: Microsoft debuts deepfake detection tool As the US presidential election nears, the company’s new tech should also help assure people that an image or video is authentic The post Microsoft debuts deepfake detection tool appeared first…

KryptoCibule: The multitasking multicurrency cryptostealer

Read the original article: KryptoCibule: The multitasking multicurrency cryptostealer ESET researchers analyze a previously undocumented trojan that is spread via malicious torrents and uses multiple tricks to squeeze as many cryptocoins as possible from its victims while staying under the…

Norway’s parliament struck by hackers

Read the original article: Norway’s parliament struck by hackers Unknown threat actors were able to exfiltrate information from the email accounts of several parliamentarians The post Norway’s parliament struck by hackers appeared first on WeLiveSecurity   Advertise on IT Security…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Canada’s government services hit by cyberattacks – Vishing attacks surge amid COVID-19 pandemic – DDoS extortionists strike again The post Week in security with Tony Anscombe appeared first on WeLiveSecurity…

DDoS extortion campaign targets financial firms, retailers

Read the original article: DDoS extortion campaign targets financial firms, retailers The extortionists attempt to scare the targets into paying by claiming to represent some of the world’s most notorious APT groups The post DDoS extortion campaign targets financial firms,…

FBI, CISA warn of spike in vishing attacks

Read the original article: FBI, CISA warn of spike in vishing attacks Cybercriminals increasingly take aim at teleworkers, setting up malicious duplicates of companies’ internal VPN login pages The post FBI, CISA warn of spike in vishing attacks appeared first…

How to secure your TikTok account

Read the original article: How to secure your TikTok account From keeping your account safe to curating who can view your liked content, we look at how you can increase your security and privacy on TikTok The post How to…

Cyber attacks: Several Canadian government services disrupted

Read the original article: Cyber attacks: Several Canadian government services disrupted Several services from the Canadian government, including the national revenue agency, had to be shut down following a series of credential stuffing cyberattacks. The post Cyber attacks: Several Canadian…

Grandoreiro banking trojan impersonates Spain’s tax agency

Read the original article: Grandoreiro banking trojan impersonates Spain’s tax agency Beware the tax bogeyman – there are tax scams aplenty The post Grandoreiro banking trojan impersonates Spain’s tax agency appeared first on WeLiveSecurity   Advertise on IT Security News.…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe This week, ESET researchers analyze fraud emails from the infamous Grandoreiro banking Trojan, impersonating the Agencia Tributaria, Spain’s tax agency. Our security expert Jake Moore demonstrates how easily it is to…

How to prepare and protect your digital legacy

Read the original article: How to prepare and protect your digital legacy It’s never too soon to plan for what will happen to your digital presence after you pass away The post How to prepare and protect your digital legacy…

Ritz London clients scammed after apparent data breach

Read the original article: Ritz London clients scammed after apparent data breach Armed with personal data stolen from the hotel’s dining reservation system, fraudsters trick guests into handing over their credit card details The post Ritz London clients scammed after…

Attack of the Instagram clones

Read the original article: Attack of the Instagram clones Could your social media account be spoofed, why would anybody do it, and what can you do to avoid having a doppelgänger? The post Attack of the Instagram clones appeared first…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe A deep dive into Mekotio – The financial fallout from data breaches – Fixing election security issues The post Week in security with Tony Anscombe appeared first on WeLiveSecurity  …

What is the cost of a data breach?

Read the original article: What is the cost of a data breach? The price tag is higher if the incident exposed customer data or if it was the result of a malicious attack, an annual IBM study finds The post…

Twitter working to fix issue with 2FA feature

Read the original article: Twitter working to fix issue with 2FA feature An apparent glitch is preventing a number of users from signing into their accounts The post Twitter working to fix issue with 2FA feature appeared first on WeLiveSecurity…

Black Hat 2020: Fixing voting – boiling the ocean?

Read the original article: Black Hat 2020: Fixing voting – boiling the ocean? With the big voting day rapidly approaching, can the security of the election still be shored up? If so, how? The post Black Hat 2020: Fixing voting – boiling…

Stadeo: Deobfuscating Stantinko and more

Read the original article: Stadeo: Deobfuscating Stantinko and more We introduce Stadeo – a set of scripts that can help fellow threat researchers and reverse engineers to deobfuscate the code of Stantinko and other malware The post Stadeo: Deobfuscating Stantinko…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe ESET highlights new research at Black Hat 2020 – What to if your data was stolen in the Blackbaud breach The post Week in security with Tony Anscombe appeared first…

Blackbaud data breach: What you should know

Read the original article: Blackbaud data breach: What you should know Here’s what to be aware of if your personal data was compromised in the breach at the cloud software provider The post Blackbaud data breach: What you should know appeared first…

FBI warns of surge in online shopping scams

Read the original article: FBI warns of surge in online shopping scams In one scheme, shoppers ordering gadgets or gym equipment are in for a rude surprise – they receive disposable face masks instead The post FBI warns of surge…

Twitter breach: Staff tricked by ‘phone spear phishing’

Read the original article: Twitter breach: Staff tricked by ‘phone spear phishing’ The attackers exploited the human factor to gain access to Twitter’s internal systems and the accounts of some of the world’s most prominent figures The post Twitter breach:…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe New ESET Threat Report is out – Defending against Thunderspy attacks – Thousands of databases wiped in Meow attacks The post Week in security with Tony Anscombe appeared first on…

ESET Threat Report Q2 2020

Read the original article: ESET Threat Report Q2 2020 A view of the Q2 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report Q2 2020…

FBI warns of disruptive DDoS amplification attacks

Read the original article: FBI warns of disruptive DDoS amplification attacks The Bureau expects cybercriminals to increasingly abuse new threat vectors for large-scale DDoS attacks The post FBI warns of disruptive DDoS amplification attacks appeared first on WeLiveSecurity   Advertise…

Almost 4,000 databases now wiped in ‘Meow’ attacks

Read the original article: Almost 4,000 databases now wiped in ‘Meow’ attacks The attackers and their motivations remain unknown; however, the incidents yet again highlight the risks of careless data security The post Almost 4,000 databases now wiped in ‘Meow’…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe VPN services accused of leaking personal data – Better security in Gmail, Meet and Chat – Data breach reports in 1H2020 The post Week in security with Tony Anscombe appeared…

Google adds security enhancements to Gmail, Meet and Chat

Read the original article: Google adds security enhancements to Gmail, Meet and Chat The tech giant introduces its own version of verified accounts in Gmail, rolls out increased moderation controls in Meet, and enhances phishing protection in Chat The post…

Argentine telecom company hit by major ransomware attack

Read the original article: Argentine telecom company hit by major ransomware attack Telecom Argentina says it has contained the attack and regained access to its systems without paying up The post Argentine telecom company hit by major ransomware attack appeared…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Trojanized cryptocurrency trading apps targeting Mac users – An Android chat app turns out to be spyware – Twitter sustains a massive hack The post Week in security with Tony…

Mac cryptocurrency trading application rebranded, bundled with malware

Read the original article: Mac cryptocurrency trading application rebranded, bundled with malware ESET researchers lure GMERA malware operators to remotely control their Mac honeypots The post Mac cryptocurrency trading application rebranded, bundled with malware appeared first on WeLiveSecurity   Advertise…

High‑profile Twitter accounts hacked to promote Bitcoin scam

Read the original article: High‑profile Twitter accounts hacked to promote Bitcoin scam Tech titans and prominent politicians among victims of a sprawling hack that Twitter says leveraged its internal tools The post High‑profile Twitter accounts hacked to promote Bitcoin scam…

Zoom patches zero‑day flaw in Windows client

Read the original article: Zoom patches zero‑day flaw in Windows client The vulnerability exposed Zoom users running Windows 7 or earlier OS versions to remote attacks The post Zoom patches zero‑day flaw in Windows client appeared first on WeLiveSecurity  …

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Up close with the Evilnum group and its eponymous malware – A severe flaw in networking gear – Router firmware under the microscope The post Week in security with Tony…

More evil: A deep look at Evilnum and its toolset

Read the original article: More evil: A deep look at Evilnum and its toolset ESET research gives a detailed picture of the operations of the Evilnum group and its toolkit deployed in attacks against carefully chosen targets in the fintech…

Attackers target critical flaw in popular networking gear

Read the original article: Attackers target critical flaw in popular networking gear The vulnerability, which received the highest possible severity score, leaves thousands of devices at risk of being taken over by remote attackers. A patch is available. The post…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Brute-force attacks against RDP surge – Is contact tracing the answer to ending the COVID-19 crisis? – Microsoft ships urgent security updates The post Week in security with Tony Anscombe…

Thousands of MongoDB databases ransacked, held for ransom

Read the original article: Thousands of MongoDB databases ransacked, held for ransom The cybercriminal behind the ransom raids on almost 23,000 databases threatens to leak the data and alert GDPR regulators The post Thousands of MongoDB databases ransacked, held for…

What is a password manager and why is it useful?

Read the original article: What is a password manager and why is it useful? A password manager can make your digital life both simpler and more secure. Are there any downsides to relying on software to create and store your…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Android ransomware posing as a COVID-19 tracing app – Ill-trained and ill-equipped newly-minted remote workers – How Bitcoin giveaway scams misuse Elon Musk’s name The post Week in security with…

Facial recognition technology banned in another US city

Read the original article: Facial recognition technology banned in another US city In a move lauded by privacy advocates, Boston joins the ranks of cities that have voted down the municipal use of the technology The post Facial recognition technology…

Cyberbullying: Adults can be victims too

Read the original article: Cyberbullying: Adults can be victims too Cyberbullying can happen to anyone, at any time – and at any age. How can adults deal with various forms of online abuse and harassment? The post Cyberbullying: Adults can…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe This week, ESET researchers released their findings about Operation In(ter)ception, a campaign that leveraged LinkedIn-based spearphishing and took aim at aerospace and military companies in Europe and the Middle East…