This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape This article has been indexed from WeLiveSecurity Read the original article: The who, where, and…
Tag: welivesecurity
ESET APT Activity Report Q4 2023–Q1 2024
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q4 2023–Q1 2024
RSA Conference 2024: AI hype overload
Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations. This article has been indexed from WeLiveSecurity Read the original article: RSA Conference 2024: AI hype…
It’s a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe
More than 40,000 security experts descended on San Francisco this week. Let’s now look back on some of the event’s highlights – including the CISA-led ‘Secure by Design’ pledge also signed by ESET. This article has been indexed from WeLiveSecurity…
In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards
We’re thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates – Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024 This article has been indexed from WeLiveSecurity Read the original article: In it…
How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe
We spoke to climate scientist Katharine Hayhoe about intersections between climate action, human psychology and spirituality, and how to channel anxiety about the state of our planet into meaningful action This article has been indexed from WeLiveSecurity Read the original…
RSAC 2024: AI hype overload
Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations. This article has been indexed from WeLiveSecurity Read the original article: RSAC 2024: AI hype overload
How to inspire the next generation of scientists | Cybersecurity podcast
As Starmus Earth draws near, we caught up with Dr. Garik Israelian to venture into the dynamic intersection of science and art, where imagination flourishes and groundbreaking ideas take flight This article has been indexed from WeLiveSecurity Read the original…
How to inspire the next generation of scientists | Unlocked 403: Cybersecurity podcast
As Starmus Earth draws near, we caught up with Dr. Garik Israelian to celebrate the fusion of science and creativity and venture where imagination flourishes and groundbreaking ideas take flight This article has been indexed from WeLiveSecurity Read the original…
Pay up, or else? – Week in security with Tony Anscombe
Organizations that fall victim to a ransomware attack are often caught between a rock and a hard place, grappling with the dilemma of whether to pay up or not This article has been indexed from WeLiveSecurity Read the original article:…
Adding insult to injury: crypto recovery scams
Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over This article has been indexed from WeLiveSecurity…
How space exploration benefits life on Earth: Q&A with David Eicher
We spoke to Astronomy magazine editor-in-chief David Eicher about key challenges facing our planet, the importance of space exploration for humanity, and the possibility of life beyond Earth This article has been indexed from WeLiveSecurity Read the original article: How…
Why space exploration is important for Earth and its future: Q&A with David Eicher
We caught up with Astronomy magazine editor-in-chief David Eicher to talk about key challenges facing our planet, the benefits of space exploration, and the possibility of life beyond Earth This article has been indexed from WeLiveSecurity Read the original article:…
Major phishing-as-a-service platform disrupted – Week in security with Tony Anscombe
The investigation uncovered at least 40,000 phishing domains that were linked to LabHost and tricked victims into handing over their sensitive details This article has been indexed from WeLiveSecurity Read the original article: Major phishing-as-a-service platform disrupted – Week in…
What makes Starmus unique? A Q&A with award-winning filmmaker Todd Miller
The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges, as well as why he became involved with Starmus This article has been indexed from WeLiveSecurity Read the original article:…
What makes Starmus unique? – A Q&A with award-winning filmmaker Todd Miller
The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges as well as why he became involved with Starmus. This article has been indexed from WeLiveSecurity Read the original article:…
The vision behind Starmus – A Q&A with the festival’s co-founder Garik Israelian
Dr. Israelian talks about Starmus’s vision and mission, the importance of inspiring and engaging audiences, and the strong sense of community within the Starmus universe This article has been indexed from WeLiveSecurity Read the original article: The vision behind Starmus…
How technology drives progress – A Q&A with Nobel laureate Michel Mayor
We spoke to Michel Mayor about the importance of public engagement with science and fostering responsibility among the youth for the preservation of our changing planet This article has been indexed from WeLiveSecurity Read the original article: How technology drives…
The many faces of impersonation fraud: Spot an imposter before it’s too late
What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be? This article has been indexed from WeLiveSecurity Read the original article:…
Protecting yourself after a medical data breach – Week in security with Tony Anscombe
What are the risks and consequences of having your health data exposed and what are the steps to take if it happens to you? This article has been indexed from WeLiveSecurity Read the original article: Protecting yourself after a medical…
RDP remains a security concern – Week in security with Tony Anscombe
Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result This article has been indexed from WeLiveSecurity Read the original…
AceCryptor attacks surge in Europe – Week in security with Tony Anscombe
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT This article has been indexed from WeLiveSecurity Read the original article: AceCryptor attacks…
A prescription for privacy protection: Exercise caution when using a mobile health app
Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data This article has been indexed from WeLiveSecurity Read the original article: A prescription…
Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe
Healthcare organizations remain firmly in attackers’ crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023 This article has been indexed from WeLiveSecurity Read the original article: Healthcare still a prime…
Threat intelligence explained | Unlocked 403: A cybersecurity podcast
We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats This article has been indexed from WeLiveSecurity Read the original article: Threat intelligence explained | Unlocked 403: A cybersecurity podcast
How to share sensitive files securely online
Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe This article has been indexed from WeLiveSecurity Read the original article: How to share sensitive files…
APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor This article has been indexed from WeLiveSecurity Read the original article: APT attacks taking aim at…
Top 10 scams targeting seniors – and how to keep your money safe
The internet can be a wonderful place. But it’s also awash with fraudsters targeting people who are susceptible to fraud. This article has been indexed from WeLiveSecurity Read the original article: Top 10 scams targeting seniors – and how to…
Irresistible: Hooks, habits and why you can’t put down your phone
Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices. This article has been indexed from WeLiveSecurity Read the original article: Irresistible: Hooks, habits and why you can’t put down your phone
Deceptive AI content and 2024 elections – Week in security with Tony Anscombe
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year This article has been indexed from WeLiveSecurity Read the…
Vulnerabilities in business VPNs under the spotlight
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk This article has been indexed from WeLiveSecurity Read the original article: Vulnerabilities in business…
PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe
Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects This article has been indexed from WeLiveSecurity Read the original article: PSYOP campaigns targeting Ukraine – Week in security with…
Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe
Here’s how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals This article has been indexed from WeLiveSecurity Read the original article: Cyber-insurance and vulnerability…
All eyes on AI | Unlocked 403: A cybersecurity podcast
Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack the basics and examine AI’s broader implications. This article has been indexed from WeLiveSecurity Read the original…
Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe
Called a “watershed year for ransomware”, 2023 marked a reversal from the decline in ransomware payments observed in the previous year This article has been indexed from WeLiveSecurity Read the original article: Ransomware payments hit a record high in 2023…
Grandoreiro banking malware disrupted – Week in security with Tony Anscombe
The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows This article has been indexed from WeLiveSecurity Read the original article: Grandoreiro banking malware…
ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora
An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: ChatGPT, the MOVEit…
ESET takes part in global operation to disrupt the Grandoreiro banking trojan
ESET provided technical analysis, statistical information, known C&C servers and was able to get a glimpse of the victimology This article has been indexed from WeLiveSecurity Read the original article: ESET takes part in global operation to disrupt the Grandoreiro…
Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe
The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK This article has been indexed from WeLiveSecurity Read the original article: Blackwood hijacks software updates to…
Assessing and mitigating supply chain cybersecurity risks
Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management This article has been indexed from WeLiveSecurity Read the original article: Assessing and mitigating supply chain…
Why many CISOs consider quitting – Week in security with Tony Anscombe
The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings This article has been indexed from WeLiveSecurity Read the original article: Why many CISOs consider quitting…
Virtual kidnapping: How to see through this terrifying scam
Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims This article has been indexed from WeLiveSecurity Read the original article: Virtual kidnapping: How to see through this…
Is Temu safe? What to know before you ‘shop like a billionaire’
Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal This article has been indexed from WeLiveSecurity Read the original article:…
The 7 deadly cloud security sins and how SMBs can do things better
By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk This article has been indexed from WeLiveSecurity Read the original article: The 7 deadly cloud security…
Lessons from SEC’s X account hack – Week in security with Tony Anscombe
The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC’s X account right ahead of the much-anticipated decision about Bitcoin ETFs This article has been indexed from WeLiveSecurity…
Attack of the copycats: How fake messaging apps and app mods could bite you
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride. This article has been indexed from WeLiveSecurity Read the original article: Attack of the copycats: How fake messaging apps and…
Love is in the AI: Finding love online takes on a whole new meaning
Is AI companionship the future of not-so-human connection – and even the cure for loneliness? This article has been indexed from WeLiveSecurity Read the original article: Love is in the AI: Finding love online takes on a whole new meaning
Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe
What are some of the key cybersecurity trends that people and organizations should have on their radars this year? This article has been indexed from WeLiveSecurity Read the original article: Cybersecurity trends and challenges to watch out for in 2024…
Lost and found: How to locate your missing devices and more
Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy This article has been indexed…
Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe
How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET’s latest Threat Report This article has been indexed from WeLiveSecurity Read the original…
Safeguard the joy: 10 tips for securing your shiny new device
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly This article has been indexed from WeLiveSecurity Read the…
New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes This article has been indexed from WeLiveSecurity Read the original article: New iOS feature to thwart…
Black Hat Europe 2023: Should we regulate AI?
ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past? This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2023: Should we regulate AI?
Black Hat Europe 2023: The past could return to haunt you
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks. This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2023: The past could return to haunt you
Surge in deceptive loan apps – Week in security with Tony Anscombe
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi This article has been indexed from WeLiveSecurity Read the original article: Surge in deceptive loan apps – Week in…
To tap or not to tap: Are NFC payments safer?
Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods? This article has been indexed from WeLiveSecurity Read the original article: To tap or not to tap: Are NFC payments safer?
Navigating privacy: Should we put the brakes on car tracking?
Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable? This article has been indexed from WeLiveSecurity Read the original article: Navigating privacy: Should we put…
Teaching appropriate use of AI tech – Week in security with Tony Anscombe
Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology This article has been indexed from WeLiveSecurity Read the original article: Teaching appropriate use of AI tech…
Very precisely lost – GPS jamming
The technology is both widely available and well developed, hence it’s also poised to proliferate – especially in the hands of those wishing ill This article has been indexed from WeLiveSecurity Read the original article: Very precisely lost – GPS…
Telekopye’s tricks of the trade – Week in security with Tony Anscombe
ESET’s research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online This article has been indexed from WeLiveSecurity Read the original article: Telekopye’s tricks of…
Telekopye: Chamber of Neanderthals’ secrets
Insight into groups operating Telekopye bots that scam people in online marketplaces This article has been indexed from WeLiveSecurity Read the original article: Telekopye: Chamber of Neanderthals’ secrets
Your voice is my password
AI-driven voice cloning can make things far too easy for scammers – I know because I’ve tested it so that you don’t have to learn about the risks the hard way. This article has been indexed from WeLiveSecurity Read the…
Fuel for thought: Can a driverless car get arrested?
What happens when problems caused by autonomous vehicles are not the result of errors, but the result of purposeful attacks? This article has been indexed from WeLiveSecurity Read the original article: Fuel for thought: Can a driverless car get arrested?
Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe
An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause This article has been indexed from WeLiveSecurity Read the…
Cyber threat intelligence: Getting on the front foot against adversaries
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk This article has been indexed from WeLiveSecurity Read the original article: Cyber threat…
Spyware disguised as a news app – Week in security with Tony Anscombe
The Urdu version of the Hunza News website offers readers the option to download an Android app – little do they know that the app is actually spyware This article has been indexed from WeLiveSecurity Read the original article: Spyware…
Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan
ESET researchers discovered Kamran, previously unknown malware, which spies on Urdu-speaking readers of Hunza News This article has been indexed from WeLiveSecurity Read the original article: Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistan
The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe
Various questions linger following the botnet’s sudden and deliberate demise, including: who actually initiated it? This article has been indexed from WeLiveSecurity Read the original article: The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe
Who killed Mozi? Finally putting the IoT zombie botnet in its grave
How ESET Research found a kill switch that had been used to take down one of the most prolific botnets out there This article has been indexed from WeLiveSecurity Read the original article: Who killed Mozi? Finally putting the IoT…
Roundcube Webmail servers under attack – Week in security with Tony Anscombe
The zero-day exploit deployed by the Winter Vivern APT group only requires that the target views a specially crafted message in a web browser This article has been indexed from WeLiveSecurity Read the original article: Roundcube Webmail servers under attack…
ESET APT Activity Report Q2–Q3 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2–Q3 2023
ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe
Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups This article has been indexed from WeLiveSecurity Read the original article: ESET’s cutting-edge threat research at LABScon – Week…
Ballistic Bobcat’s Sponsor backdoor – Week in security with Tony Anscombe
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States This article has been indexed from WeLiveSecurity…
Read it right! How to spot scams on Reddit
Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as “the front page of the Internet”? This article has been indexed from WeLiveSecurity Read the original…
Will you give X your biometric data? – Week in security with Tony Anscombe
The update to X’s privacy policy has sparked some questions among privacy and security folks, including how long X will retain users’ biometric information and how the data will be stored and secured This article has been indexed from WeLiveSecurity…
Staying ahead of threats: 5 cybercrime trends to watch
New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought This article has been indexed from WeLiveSecurity Read the original article: Staying ahead of threats: 5 cybercrime…
Fake Signal and Telegram apps – Week in security with Tony Anscombe
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites This article has been indexed from WeLiveSecurity Read the original article: Fake Signal and Telegram apps –…
How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe
ESET researchers uncover a Telegram bot that enables even less tech-savvy scammers to defraud people out of their money This article has been indexed from WeLiveSecurity Read the original article: How a Telegram bot helps scammers target victims – Week…
Scarabs colon-izing vulnerable servers
Analysis of Spacecolon, a toolset used to deploy Scarab ransomware on vulnerable servers, and its operators, CosmicBeetle This article has been indexed from WeLiveSecurity Read the original article: Scarabs colon-izing vulnerable servers
Evacuation of 30,000 hackers – Week in security with Tony Anscombe
DEF CON, the annual hacker’s convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the convention due to a bomb threat. This article has been indexed from WeLiveSecurity Read the original article: Evacuation of 30,000 hackers –…
DEF CON 31: US DoD urges hackers to go and hack ‘AI’
The limits of current AI need to be tested before we can rely on their output This article has been indexed from WeLiveSecurity Read the original article: DEF CON 31: US DoD urges hackers to go and hack ‘AI’
DEF CON 31: Robot vacuums may be doing more than they claim
When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision. This article has been indexed from WeLiveSecurity Read the original article: DEF CON 31: Robot vacuums may be doing more than…
Check cybersecurity pre-invest – Week in security with Tony Anscombe
When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules. This article has been indexed from WeLiveSecurity Read the original article: Check cybersecurity pre-invest – Week in security…
Is backdoor access oppressive? – Week in security with Tony Anscombe
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK? This article has been indexed from WeLiveSecurity Read the original article: Is backdoor access oppressive? – Week in security…
Dear all, What are some common subject lines in phishing emails?
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency. This article has been indexed from WeLiveSecurity Read the original article: Dear all, What are some common subject lines in phishing emails?
Gathering dust and data: How robotic vacuums can spy on you.
Mitigate the risk of data leaks with a careful review of the product and the proper settings. This article has been indexed from WeLiveSecurity Read the original article: Gathering dust and data: How robotic vacuums can spy on you.
Dear all! What are some common subject lines in phishing emails?
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency. This article has been indexed from WeLiveSecurity Read the original article: Dear all! What are some common subject lines in phishing emails?
ChatGPT, will you be my Valentine?
Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot that the world has fallen in love with so badly. The post ChatGPT, will you be my Valentine? appeared…
Confident cybersecurity means fewer headaches for SMBs
Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts The post Confident cybersecurity means fewer headaches for SMBs appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the…
Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe
What is behind the drop in ransomware and what should still be done for containing the ransomware scourge? The post Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity This…
Alexa, who else is listening?
Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Alexa, who else is listening?
ESET Threat Report T3 2022
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T3 2022 appeared first on WeLiveSecurity This article has been indexed…
Into the void: Your tech and security in digital darkness
No internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications of being plunged into digital darkness. The post Into the void: Your tech and security in digital darkness appeared first on WeLiveSecurity This article…
Online safety laws: What’s in store for children’s digital playgrounds?
As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm The post Online safety laws: What’s in store for children’s digital playgrounds? appeared first on…
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe
As our latest APT Activity Report makes abundantly clear, the threat of cyberespionage and stealthy attacks remains very real The post Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity…
Is that survey real or fake? How to spot a survey scam
“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any surveys online The post Is that survey real or fake? How to spot a…
Less is more: Conquer your digital clutter before it conquers you
Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security The post Less is more: Conquer your digital clutter before it conquers you appeared first on WeLiveSecurity This article…
ESET APT Activity Report T3 2022
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post ESET APT Activity Report T3 2022 appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
SwiftSlicer: New destructive wiper malware strikes Ukraine
Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country The post SwiftSlicer: New destructive wiper malware strikes Ukraine appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: SwiftSlicer: New destructive…
Are you in control of your personal data? – Week in security with Tony Anscombe
Data Privacy Week is a reminder to protect your data – all year round. Here are three privacy-boosting habits you can start today. The post Are you in control of your personal data? – Week in security with Tony Anscombe…