One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?
The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity
As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you're dealing with a scam?
The post Watch out for survey scams β Week in security with Tony Anscombe appeared first on WeLiveSecurity
The lead-up to the Canada Day festivities has brought a tax scam with it
The post Phishing scam poses as Canadian tax agency before Canada Day appeared first on WeLiveSecurity
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, thatβs because it is
The post Costco 40th anniversary scam targets WhatsApp users appeared first on WeLiveSecurity
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
The post Do back offices mean backdoors? appeared first on WeLiveSecurity
Here are some of the most common ways hackers can get hold of other peopleβs credit card data β andΒ how you can keep yours safe
The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity
As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?
The post Instagramβs new age verification tool β Week in security with Tony Anscombe appeared first on WeLiveSecurity
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
The post Virtual private networks: 5Β common questions about VPNs answered appeared first on WeLiveSecurity
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity
As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
The post How to spot malicious spam β Week in security with Tony Anscombe appeared first on WeLiveSecurity
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
The post How Emotet is changing tactics in response to Microsoftβs tightening of Office macro security appeared first on WeLiveSecurity