Tag: welivesecurity

Watering hole deploys new macOS malware, DazzleSpy, in Asia

This article has been indexed from WeLiveSecurity Hong Kong pro-democracy radio station website compromised to serve a Safari exploit that installed cyberespionage malware on site visitors’ Macs The post Watering hole deploys new macOS malware, DazzleSpy, in Asia appeared first…

How I hacked my friend’s PayPal account

This article has been indexed from WeLiveSecurity Somebody could easily take control of your PayPal account and steal money from you if you’re not careful – here’s how to stay safe from a simple but effective attack The post How…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET research into Donot Team attacks – Common signs that your email has been hacked – Social media dos and don’ts in the workplace The post Week in security with Tony Anscombe appeared…

How to know if your email has been hacked

This article has been indexed from WeLiveSecurity Think your email may have been hacked? Here are the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again The post…

DoNot Go! Do not respawn!

This article has been indexed from WeLiveSecurity ESET researchers take a deep look into recent attacks carried out by Donot Team throughout 2020 and 2021, targeting government and military entities in several South Asian countries The post DoNot Go! Do…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity How malware exploits security flaws in kernel drivers – Watch out for cryptocurrency scams – Why loyalty accounts are a target for criminals The post Week in security with Tony Anscombe appeared first…

Signed kernel drivers – Unguarded gateway to Windows’ core

This article has been indexed from WeLiveSecurity ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation The post Signed kernel drivers – Unguarded gateway to Windows’ core appeared first…

CES 2022: Wireless power for all

This article has been indexed from WeLiveSecurity We don’t need no stinkin’ wall power as CES shows off the power and promise of usable long-range wireless charging The post CES 2022: Wireless power for all appeared first on WeLiveSecurity Read…

CES 2022: Space security – no more flying blind

This article has been indexed from WeLiveSecurity And no more worrying about your satellite being smashed by a “drunk driver” as new tech promises to predict hazards in orbit The post CES 2022: Space security – no more flying blind appeared…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity CES gives us a glimpse of our connected future – 10 bad cybersecurity habits to break this year – How hackers steal passwords The post Week in security with Tony Anscombe appeared first…

CES 2022: More sensors than people

This article has been indexed from WeLiveSecurity A sea of sensors will soon influence almost everything in your world The post CES 2022: More sensors than people appeared first on WeLiveSecurity Read the original article: CES 2022: More sensors than…

22 cybersecurity statistics to know for 2022

This article has been indexed from WeLiveSecurity As we usher in the New Year, let’s take a look at some statistics that will help you stay up-to-date on recent cybersecurity trends The post 22 cybersecurity statistics to know for 2022…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Why the vulnerability in Log4j poses a grave threat – What businesses should know about Log4Shell – ESET wraps up a series of deep-dives into Latin American banking trojans The post Week in…

The dirty dozen of Latin America: From Amavaldo to Zumanek

This article has been indexed from WeLiveSecurity The grand finale of our series dedicated to demystifying Latin American banking trojans The post The dirty dozen of Latin America: From Amavaldo to Zumanek appeared first on WeLiveSecurity Read the original article:…

What every business leader needs to know about Log4Shell

This article has been indexed from WeLiveSecurity Hundreds of thousands of attempts to exploit the vulnerability are under way The post What every business leader needs to know about Log4Shell appeared first on WeLiveSecurity Read the original article: What every…

5 warning signs your identity has been stolen

This article has been indexed from WeLiveSecurity By spotting these early warning signs of identity theft, you can minimize the impact on you and your family The post 5 warning signs your identity has been stolen appeared first on WeLiveSecurity…

Log4Shell vulnerability: What we know so far

This article has been indexed from WeLiveSecurity The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far The post Log4Shell vulnerability: What we know so far appeared…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity How ‘shoulder surfers’ could hack into your Snapchat – Staying safe from gift card fraud – What is a buffer overflow vulnerability? The post Week in security with Tony Anscombe appeared first on…

5 common gift card scams and how to spot them

This article has been indexed from WeLiveSecurity It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET researchers analyze malware frameworks targeting air-gapped networks – ESET Research launches a podcast – INTERPOL cracks down on online fraud The post Week in security with Tony Anscombe appeared first on WeLiveSecurity…

Jumping the air gap: 15 years of nation‑state effort

This article has been indexed from WeLiveSecurity ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs The post Jumping the…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice The post Week in security with…

What to do if you receive a data breach notice

This article has been indexed from WeLiveSecurity Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed The post What to…

CYBERWARCON – Foreign influence operations grow up

This article has been indexed from WeLiveSecurity Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks. The post CYBERWARCON – Foreign influence operations grow up appeared first…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET discovers watering hole attacks in the Middle East – Getting your life back on track after identity theft – How foreign influence operations have evolved The post Week in security with Tony…

FBI systems compromised to send out fake attack alerts

This article has been indexed from WeLiveSecurity Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks The post FBI systems compromised to send out fake attack alerts appeared first on…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Steps to take right after a data breach – What to consider before going passwordless – 7 million people hit by Robinhood data breach The post Week in security with Tony Anscombe appeared…

Robinhood data breach affects 7 million people

This article has been indexed from WeLiveSecurity An attacker gained access to some of Robinhood’s customer support systems and stole the personal data of around a third of the app’s userbase The post Robinhood data breach affects 7 million people…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity What’s it like working as a malware researcher? – ProtonMail and the battle for email privacy – Man charged with hacking, trying to extort US sports leagues The post Week in security with…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read…

5 tips for parents for a cybersecure Halloween

This article has been indexed from WeLiveSecurity What are some of the key dangers faced by children online and how can you help protect them from the ghosts, ghouls and goblins creeping on the internet? The post 5 tips for…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity How to break into cybersecurity – Is your password easy to guess? – Shining a spotlight on the security risks of shadow IT The post Week in security with Tony Anscombe appeared first…

Cybersecurity careers: What to know and how to get started

This article has been indexed from WeLiveSecurity Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the…

A recipe for failure: Predictably poor passwords

This article has been indexed from WeLiveSecurity Security professionals advise to never use ‘beef stew’ as a password. It just isn’t stroganoff. The post A recipe for failure: Predictably poor passwords appeared first on WeLiveSecurity Read the original article: A…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Phishing and how to avoid taking the bait – Offboarding employees securely – Why old malware refuses to die The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the…

Microsoft thwarts record‑breaking DDoS attack

This article has been indexed from WeLiveSecurity The attack, which clocked in at 2.4 Tbps, targeted one of Azure customers based in Europe The post Microsoft thwarts record‑breaking DDoS attack appeared first on WeLiveSecurity Read the original article: Microsoft thwarts…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET research discovers ESPecter bootkit – FontOnLake targeting Linux – Fake SafeMoon app update The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the original article: Week in security…

FontOnLake: Previously unknown malware family targeting Linux

This article has been indexed from WeLiveSecurity ESET researchers discover a malware family with tools that show signs they’re used in targeted attacks The post FontOnLake: Previously unknown malware family targeting Linux appeared first on WeLiveSecurity Read the original article:…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity New ESET Threat Report is out – Cybersecurity Awareness Month begins today – What organizations should do to secure their VPNs The post Week in security with Tony Anscombe appeared first on WeLiveSecurity…

ESET Threat Report T2 2021

This article has been indexed from WeLiveSecurity A view of the T2 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T2 2021 appeared first…

CISA and NSA release guidance for securing VPNs

This article has been indexed from WeLiveSecurity What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks The post CISA and NSA release guidance for securing VPNs appeared first on WeLiveSecurity Read…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET unmasks FamousSparrow APT group – Stopping cloud data leaks – European cybercrime ring busted The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the original article: Week in…

FamousSparrow: A suspicious hotel guest

This article has been indexed from WeLiveSecurity Yet another APT group that exploited the ProxyLogon vulnerability in March 2021 The post FamousSparrow: A suspicious hotel guest appeared first on WeLiveSecurity Read the original article: FamousSparrow: A suspicious hotel guest

Bug in macOS Finder allows remote code execution

This article has been indexed from WeLiveSecurity While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented The post Bug in macOS Finder allows remote code execution appeared first on WeLiveSecurity Read…

Numando: Count once, code twice

This article has been indexed from WeLiveSecurity The (probably) penultimate post in our occasional series demystifying Latin American banking trojans. The post Numando: Count once, code twice appeared first on WeLiveSecurity Read the original article: Numando: Count once, code twice

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Analysis of Numando banking trojan, steps to mitigate attack surface, and more! – Week in security with Tony Anscombe The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the…

What is a cyberattack surface and how can you reduce it?

This article has been indexed from WeLiveSecurity Discover the best ways to mitigate your organization’s attack surface, in order to maximize cybersecurity. The post What is a cyberattack surface and how can you reduce it? appeared first on WeLiveSecurity Read…

WhatsApp announces end‑to‑end encrypted backups

This article has been indexed from WeLiveSecurity The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks. The post WhatsApp announces end‑to‑end encrypted backups appeared first on WeLiveSecurity Read the…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Cyberespionnage against Kurdish ethnic group, and more! – Week in security with Tony Anscombe The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the original article: Week in security…