There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud The post Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour appeared…
Tag: Cybercrime – WeLiveSecurity
The danger within: 5 steps you can take to combat insider threats
Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar? The post The danger within: 5 steps you can take to combat insider threats appeared first on WeLiveSecurity This…
ESET Threat Report H1 2023
A view of the H1 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report H1 2023 appeared first on WeLiveSecurity This article has been indexed…
Deepfaking it: What to know about deepfake‑driven sextortion schemes
Criminals increasingly create deepfake nudes from people’s benign public photos in order to extort money from them, the FBI warns The post Deepfaking it: What to know about deepfake‑driven sextortion schemes appeared first on WeLiveSecurity This article has been indexed…
Verizon 2023 DBIR: What’s new this year and top takeaways for SMBs
Here are some of the key insights on the evolving data breach landscape as revealed by Verizon’s analysis of more than 16,000 incidents The post Verizon 2023 DBIR: What’s new this year and top takeaways for SMBs appeared first on…
Employee monitoring: is ‘bossware’ right for your company?
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees The post Employee monitoring: is ‘bossware’ right for your company? appeared first on WeLiveSecurity This article…
Avoid juice jacking and recharge your batteries safely this summer
Cybercriminals can use USB charging stations in airports, hotels, malls or other public spaces as conduits for malware The post Avoid juice jacking and recharge your batteries safely this summer appeared first on WeLiveSecurity This article has been indexed from…
Maltego: Check how exposed you are online
A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources The post Maltego: Check how exposed you are online appeared first on WeLiveSecurity This article has been indexed from Cybercrime – WeLiveSecurity…
Going on vacation soon? Stay one step ahead of travel scammers
From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels The post Going on vacation soon? Stay one step ahead of travel…
Passwords out, passkeys in: are you ready to make the switch?
With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other? The post Passwords out, passkeys in: are you ready to make the switch? appeared first on WeLiveSecurity This…
Cyber insurance: What is it and does my company need it?
While not a ‘get out of jail free card’ for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident The post Cyber insurance: What is it and does my company need it? appeared first…
Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys The post Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme appeared first…
Digital security for the self‑employed: Staying safe without an IT team to help
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business The post Digital security for the self‑employed: Staying safe without an IT team to help appeared first on WeLiveSecurity This…
Top 5 search engines for internet‑connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet The post Top 5 search engines for internet‑connected devices and services appeared first on WeLiveSecurity…
5 useful search engines for internet‑connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet The post 5 useful search engines for internet‑connected devices and services appeared first on WeLiveSecurity…
Meet “AI”, your new colleague: could it expose your company’s secrets?
Before rushing to embrace the LLM-powered “hire”, make sure your organization has safeguards in place to avoid putting its business and customer data at risk The post Meet “AI”, your new colleague: could it expose your company’s secrets? appeared first…
You may not care where you download software from, but malware does
Why do people still download files from sketchy places and get compromised as a result? The post You may not care where you download software from, but malware does appeared first on WeLiveSecurity This article has been indexed from Cybercrime…
Turning on stealth mode: 5 simple strategies for staying under the radar online
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details The post Turning on stealth mode: 5 simple strategies for staying under the radar online…
How the war in Ukraine has been a catalyst in private‑public collaborations
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital The post How the war in Ukraine has been a catalyst…
ESET APT Activity Report Q4 2022–Q1 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023 The post ESET APT Activity Report Q4 2022–Q1 2023 appeared first on WeLiveSecurity This article has been indexed from Cybercrime – WeLiveSecurity…
Creating strong, yet user‑friendly passwords: Tips for your business password policy
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization The post Creating strong, yet user‑friendly passwords: Tips for your business password…
APT groups muddying the waters for MSPs
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers The post APT groups muddying the waters for MSPs appeared first on WeLiveSecurity This article has been indexed from…
RSA Conference 2023 – How AI will infiltrate the world
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications The post RSA Conference 2023 – How AI will infiltrate the world appeared first…
Safety first: 5 cybersecurity tips for freelance bloggers
The much-dreaded writer’s block isn’t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers? The post Safety first: 5 cybersecurity tips for freelance bloggers appeared first…
What are the cybersecurity concerns of SMBs by sector?
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured The post What are the cybersecurity concerns of SMBs by sector? appeared…
10 things to look out for when buying a password manager
Here’s how to choose the right password vault for you and what exactly to consider when weighing your options The post 10 things to look out for when buying a password manager appeared first on WeLiveSecurity This article has been…
Cleaning up your social media and passwords: What to trash and what to treasure
Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos The post Cleaning up your social media and passwords: What to trash and what to treasure appeared…
Why you should spring clean your home network and audit your backups
Do you know how many devices are connected to your home network? You don’t? This is precisely why it’s time for a network audit. The post Why you should spring clean your home network and audit your backups appeared first…
Spring into action and tidy up your digital life like a pro
Spring is in the air and as the leaves start growing again, why not breathe some new life into the devices you depend on so badly? The post Spring into action and tidy up your digital life like a pro…
World Backup Day: Avoiding a data disaster is a forever topic
By failing to prepare you are preparing to fail. Make sure you’re able to bounce back if, or when, a data disaster strikes. The post World Backup Day: Avoiding a data disaster is a forever topic appeared first on WeLiveSecurity…
Pig butchering scams: The anatomy of a fast‑growing threat
How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers The post Pig butchering scams: The anatomy of a fast‑growing threat appeared first on WeLiveSecurity This article has been…
Understanding Managed Detection and Response and what to look for in an MDR solution
Why your organization should consider an MDR solution and five key things to look for in a service offering The post Understanding Managed Detection and Response and what to look for in an MDR solution appeared first on WeLiveSecurity This…
Understanding Managed Detection and Response – and what to look for in an MDR solution
Why your organization should consider an MDR solution and five key things to look for in a service offering The post Understanding Managed Detection and Response – and what to look for in an MDR solution appeared first on WeLiveSecurity…
SVB’s collapse is a scammer’s dream: Don’t get caught out
How cybercriminals can exploit Silicon Valley Bank’s downfall for their own ends – and at your expense The post SVB’s collapse is a scammer’s dream: Don’t get caught out appeared first on WeLiveSecurity This article has been indexed from Cybercrime…
5 signs you’ve fallen for a scam – and what to do next
Here’s how to know you have fallen victim to a scam – and what to do in order to undo or mitigate the damage. The post 5 signs you’ve fallen for a scam – and what to do next appeared…
Common WhatsApp scams and how to avoid them
Here’s a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them. The post Common WhatsApp scams and how to avoid them…
A year of wiper attacks in Ukraine
ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022 The post A year of wiper attacks in Ukraine appeared first on WeLiveSecurity This article has been indexed…
ESET SMB Digital Security Sentiment Report: The damaging effects of a breach
SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached The post ESET SMB Digital Security Sentiment Report: The damaging effects of a…
Will ChatGPT start writing killer malware?
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware? The post Will ChatGPT start writing killer malware? appeared first on WeLiveSecurity This article has been indexed from Cybercrime –…
Security amidst a global frost
No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield The post Security amidst a global frost appeared first on WeLiveSecurity This article has been indexed from Cybercrime – WeLiveSecurity Read…
10 signs that scammers have you in their sights
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing The post 10 signs that scammers have you in their sights appeared first on WeLiveSecurity This article…