Tag: welivesecurity

Security fatigue is real: Here’s how to overcome it

Do your employees take more risks with valuable data because they’ve become desensitized to security guidance? Spot the symptoms before it’s too late. The post Security fatigue is real: Here’s how to overcome it appeared first on WeLiveSecurity This article…

Tor vs. VPN: Which should you choose?

Both Tor and a VPN can greatly help you keep prying eyes away from your online life, but they’re also two very different beasts. Which suits your needs better? The post Tor vs. VPN: Which should you choose? appeared first…

ESET APT Activity Report T2 2022

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022 The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…

Toward the cutting edge: SMBs contemplating enterprise security

Survey finds SMBs, weary of security failures, curious about detection and response The post Toward the cutting edge: SMBs contemplating enterprise security appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Toward the cutting…

10 common security mistakes and how to avoid them

Do you make these security mistakes and put yourself at greater risk for successful attacks? The post 10 common security mistakes and how to avoid them appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…

Ransomware rages on – Week in security with Tony Anscombe

This week’s news offered fresh reminders of the threat that ransomware poses for businesses and critical infrastructure worldwide The post Ransomware rages on – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed from…

Don’t get scammed when buying tickets online

With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read…

Don’t get scammed when buying tickets online

With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read…

Don’t get scammed when buying tickets online

With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read…

5 steps to protect your school from cyberattacks

What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay? The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity This article has been…

5 steps to protect your school from cyberattacks

What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay? The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity This article has been…

POLONIUM targets Israel with Creepy malware

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…

POLONIUM targets Israel with Creepy malware

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…

ESET Threat Report T2 2022

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity This article has been indexed…

The need to change cybersecurity for the next generation

Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits The post The need to change cybersecurity for the next generation appeared first on WeLiveSecurity This article has…

ESET Threat Report T2 2022

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity This article has been indexed…

Protecting teens from sextortion: What parents should know

Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity This article has been…

Protecting teens from sextortion: What parents should know

Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity This article has been…

Worok: The big picture

Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files The post Worok: The big picture appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article:…

How to take control over your digital legacy

Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services. The post How to take…

What is doxing and how to protect yourself

Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you The post What is doxing and how to protect yourself appeared first on WeLiveSecurity This article has been…

A step‑by‑step guide to enjoy LinkedIn safely

LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a…

Black Hat USA 2022: Burnout, a significant issue

The digital skills gap, especially in cybersecurity, is not a new phenomenon. This problematic is now exacerbate by the prevalence of burnout, which was presented at Black Hat USA 2022 The post Black Hat USA 2022: Burnout, a significant issue…

Black Hat 2022‑ Cyberdefense in a global threats era

Our Security evangelist’s take on this first day of Black Hat 2022, where cyberdefense was on every mind. The post Black Hat 2022‑ Cyberdefense in a global threats era appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity…

An eighties classic – Zero Trust

A deep-dive in Zero-trust, to help you navigate in a zero-trust world and further secure your organization. The post An eighties classic – Zero Trust appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article:…

API security moves mainstream

The heavyweights are now moving into API security, cementing it as “A Thing” The post API security moves mainstream appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: API security moves mainstream