FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWeLiveSecurity

10 common security mistakes and how to avoid them

By Phil Muncaster

Do you put yourself at greater risk for successful attacks by making one of these security mistakes?

The post 10 common security mistakes and how to avoid them appeared first on WeLiveSecurity

The future starts now: 10Β major challenges facing cybersecurity

By Juan Manuel HarΓ‘n

To mark Antimalware Day, we’ve rounded up some of the most pressing issues for cybersecurity now and in the future

The post The future starts now: 10Β major challenges facing cybersecurity appeared first on WeLiveSecurity

Why your phone is slow – and how to speed it up

By AndrΓ© Lameiras

You probably don’t have to ditch your phone just yet – try these simple tips and tricks to make any Android device or iPhone run faster

The post Why your phone is slow – and how to speed it up appeared first on WeLiveSecurity

5 reasons to keep your software and devices up to date

By Phil Muncaster

Next time you're tempted to hold off on installing software updates, remember why these updates are necessary in the first place

The post 5 reasons to keep your software and devices up to date appeared first on WeLiveSecurity

5 steps to protect your school from cyberattacks

By AndrΓ© Lameiras

What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay?

The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity

The need to change cybersecurity for the next generation

By Tony Anscombe

Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits

The post The need to change cybersecurity for the next generation appeared first on WeLiveSecurity

Can your iPhone be hacked? What to know about iOS security

By AndrΓ© Lameiras

Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device

The post Can your iPhone be hacked? What to know about iOS security appeared first on WeLiveSecurity

RDP on the radar: AnΒ up‑close view of evolving remote access threats

By Aryeh Goretsky

Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol

The post RDP on the radar: AnΒ up‑close view of evolving remote access threats appeared first on WeLiveSecurity

DEF CON – β€œdon’t worry, the elections are safe” edition

By Cameron Camp

Don't worry, elections are safe – this is just one highlight from the DEF CON 30 conference.

The post DEF CON – β€œdon’t worry, the elections are safe” edition appeared first on WeLiveSecurity

How a spoofed email passed the SPF check and landed in my inbox

By Rene Holt

The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain

The post How a spoofed email passed the SPF check and landed in my inbox appeared first on WeLiveSecurity

Black Hat USA 2022: Burnout, a significant issue

By Tony Anscombe

The digital skills gap, especially in cybersecurity, is not a new phenomenon, with the problem now further exacerbated by the prevalence of burnout

The post Black Hat USA 2022: Burnout, a significant issue appeared first on WeLiveSecurity

Black Hat – Windows isn’t the only mass casualty platform anymore

By Cameron Camp

Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars

The post Black Hat – Windows isn’t the only mass casualty platform anymore appeared first on WeLiveSecurity

Black Hat 2022 – Cyberdefense in a global threats era

By Tony Anscombe

Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.

The post Black Hat 2022 – Cyberdefense in a global threats era appeared first on WeLiveSecurity

Safety first: how to tweak the settings on your dating apps

By AndrΓ© Lameiras

Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.

The post Safety first: how to tweak the settings on your dating apps appeared first on WeLiveSecurity

An eighties classic – Zero Trust

By Tony Anscombe

A deep-dive into zero trust to help you navigate the threat landscape in a zero-trust world and further secure your organization

The post An eighties classic – Zero Trust appeared first on WeLiveSecurity

Start as you mean to go on: the top 10 steps to securing your new computer

By Phil Muncaster

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.

The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity

Staying safe online: How to browse the web securely

By Phil Muncaster

Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.

The post Staying safe online: How to browse the web securely appeared first on WeLiveSecurity

API security moves mainstream

By Cameron Camp

The heavyweights are now moving into API security, cementing it as β€œA Thing”

The post API security moves mainstream appeared first on WeLiveSecurity

Play it safe: 5 reasons not to download pirated games

By Phil Muncaster

It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games

The post Play it safe: 5 reasons not to download pirated games appeared first on WeLiveSecurity

Cyberattacks: A very real existential threat to organizations

By Phil Muncaster

One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?

The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity

Do back offices mean backdoors?

By James Shepperd

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture

The post Do back offices mean backdoors? appeared first on WeLiveSecurity

Virtual private networks: 5Β common questions about VPNs answered

By AndrΓ© Lameiras

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask

The post Virtual private networks: 5Β common questions about VPNs answered appeared first on WeLiveSecurity

Phishing awareness training: Help your employees avoid the hook

By Phil Muncaster

Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders

The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity

❌