FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWeLiveSecurity

Keeping it real: Don’t fall for lies about the war

By André Lameiras

Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what’s in the fake news

The post Keeping it real: Don’t fall for lies about the war appeared first on WeLiveSecurity

ESET Threat Report T 1 2022

By Roman Kovac

A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

The post ESET Threat Report T 1 2022 appeared first on WeLiveSecurity

100 days of war in Ukraine: How the conflict is playing out in cyberspace

By André Lameiras

It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict

The post 100 days of war in Ukraine: How the conflict is playing out in cyberspace appeared first on WeLiveSecurity

RSA – Spot the real fake

By Cameron Camp

How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer

The post RSA – Spot the real fake appeared first on WeLiveSecurity

RSA – Creepy real‑world edition

By Cameron Camp

Digital fiddling somehow got mixed up in a real war

The post RSA – Creepy real‑world edition appeared first on WeLiveSecurity

Industroyer: A cyber‑weapon that brought down a power grid

By André Lameiras

Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids

The post Industroyer: A cyber‑weapon that brought down a power grid appeared first on WeLiveSecurity

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

By Rene Holt

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

The post How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security appeared first on WeLiveSecurity

Crypto mixers: What are they and how are they used?

By Sol González

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

Virtual private networks: 5 common questions about VPNs answered

By André Lameiras

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask

The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity

Do back offices mean backdoors?

By James Shepperd

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture

The post Do back offices mean backdoors? appeared first on WeLiveSecurity

Costco 40th anniversary scam targets WhatsApp users

By Miguel Ángel Mendoza

If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is

The post Costco 40th anniversary scam targets WhatsApp users appeared first on WeLiveSecurity

Phishing scam poses as Canadian tax agency before Canada Day

By Rene Holt

The lead-up to the Canada Day festivities has brought a tax scam with it

The post Phishing scam poses as Canadian tax agency before Canada Day appeared first on WeLiveSecurity

Cyberattacks: A very real existential threat to organizations

By Phil Muncaster

One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?

The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity

8 common Facebook Marketplace scams and how to avoid them

By Phil Muncaster

Here’s what to watch out for when buying or selling stuff on the online marketplace and how to tell if you’re being scammed

The post 8 common Facebook Marketplace scams and how to avoid them appeared first on WeLiveSecurity

Driving to France this summer? Watch out for scam websites before you go

By Jake Moore

Scammers don't take the summer off – be on your guard when buying your Crit'Air sticker

The post Driving to France this summer? Watch out for scam websites before you go appeared first on WeLiveSecurity

I see what you did there: A look at the CloudMensis macOS spyware

By Marc-Etienne M.Léveillé

Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs

The post I see what you did there: A look at the CloudMensis macOS spyware appeared first on WeLiveSecurity

ESET Research Podcast: Hot security topics at RSA or mostly hype?

By ESET Research

Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices

The post ESET Research Podcast: Hot security topics at RSA or mostly hype? appeared first on WeLiveSecurity

Cash App fraud: 10 common scams to watch out for

By Phil Muncaster

It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash

The post Cash App fraud: 10 common scams to watch out for appeared first on WeLiveSecurity

Don’t get singed by scammers while you’re carrying the torch for Tinder 

By André Lameiras

Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.

The post Don’t get singed by scammers while you’re carrying the torch for Tinder  appeared first on WeLiveSecurity

A step‑by‑step guide to enjoying LinkedIn safely

By André Lameiras

LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.

The post A step‑by‑step guide to enjoying LinkedIn safely appeared first on WeLiveSecurity

Is your personal data all over the internet? 7 steps to cleaning up your online presence

By André Lameiras

You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps

The post Is your personal data all over the internet? 7 steps to cleaning up your online presence appeared first on WeLiveSecurity

What is doxing and how to protect yourself

By André Lameiras

Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you

The post What is doxing and how to protect yourself appeared first on WeLiveSecurity

TikShock: Don’t get caught out by these 5 TikTok scams

By Jake Moore

Are you aware of the perils of the world’s no. 1 social media? Do you know how to avoid scams and stay safe on TikTok?

The post TikShock: Don’t get caught out by these 5 TikTok scams appeared first on WeLiveSecurity

How to take control over your digital legacy

By André Lameiras

Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.

The post How to take control over your digital legacy appeared first on WeLiveSecurity

Worok: The big picture

By Thibaut Passilly

Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files

The post Worok: The big picture appeared first on WeLiveSecurity

RDP on the radar: An up‑close view of evolving remote access threats

By Aryeh Goretsky

Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol

The post RDP on the radar: An up‑close view of evolving remote access threats appeared first on WeLiveSecurity

You never walk alone: The SideWalk backdoor gets a Linux variant

By Vladislav Hrčka

ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor

The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity

Hey WeLiveSecurity, how does biometric authentication work?

By André Lameiras

Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?

The post Hey WeLiveSecurity, how does biometric authentication work? appeared first on WeLiveSecurity

Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium

By Peter Kálnai

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers

The post Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium appeared first on WeLiveSecurity

ESET Threat Report T2 2022

By Roman Kovac

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity

POLONIUM targets Israel with Creepy malware

By Matías Porolli

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group

The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity

10 common Zelle scams – and how to avoid them

By Phil Muncaster

Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep your money safe while using the popular P2P payment service.

The post 10 common Zelle scams – and how to avoid them appeared first on WeLiveSecurity

Don’t get scammed when buying tickets online

By Jake Moore

With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force

The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity

Domestic Kitten campaign spying on Iranian citizens with new FurBall malware

By Lukas Stefanko

APT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app

The post Domestic Kitten campaign spying on Iranian citizens with new FurBall malware appeared first on WeLiveSecurity

Parcel delivery scams are on the rise: Do you know what to watch out for?

By Phil Muncaster

As package delivery scams that spoof DHL, USPS and other delivery companies soar, here’s how to stay safe not just this shopping season

The post Parcel delivery scams are on the rise: Do you know what to watch out for? appeared first on WeLiveSecurity

Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween

By André Lameiras

Gather around, folks, to learn about some of the ghastliest tricks used by criminals online and how you can avoid security horrors this Halloween and beyond

The post Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween appeared first on WeLiveSecurity

The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs

By Phil Muncaster

Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras to put your worries to rest.

The post The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs appeared first on WeLiveSecurity

Hacking baby monitors can be child’s play: Here’s how to stay safe

By Phil Muncaster

Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk

The post Hacking baby monitors can be child’s play: Here’s how to stay safe appeared first on WeLiveSecurity

FIFA World Cup 2022 scams: Beware of fake lotteries, ticket fraud and other cons

By Juan Manuel Harán

When in doubt, kick it out, plus other tips for hardening your cyber-defenses against World Cup-themed phishing and other scams

The post FIFA World Cup 2022 scams: Beware of fake lotteries, ticket fraud and other cons appeared first on WeLiveSecurity

ESET APT Activity Report T2 2022

By Jean-Ian Boutin

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022

The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity

Tor vs. VPN: Which should you choose?

By André Lameiras

Both Tor and a VPN can greatly help you keep prying eyes away from your online life, but they’re also two very different beasts. Which suits your needs better?

The post Tor vs. VPN: Which should you choose? appeared first on WeLiveSecurity

Bahamut cybermercenary group targets Android users with fake VPN apps

By Lukas Stefanko

Malicious apps used in this active campaign exfiltrate contacts, SMS messages, recorded phone calls, and even chat messages from apps such as Signal, Viber, and Telegram

The post Bahamut cybermercenary group targets Android users with fake VPN apps appeared first on WeLiveSecurity

10 tips to avoid Black Friday and Cyber Monday scams

By André Lameiras

It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams doing the rounds this holiday shopping season

The post 10 tips to avoid Black Friday and Cyber Monday scams appeared first on WeLiveSecurity

RansomBoggs: New ransomware targeting Ukraine

By Editor

ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm's fingerprints all over it

The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity

Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin

By Filip Jurčacko

ESET researchers uncover Dolphin, a sophisticated backdoor extending the arsenal of the ScarCruft APT group

The post Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin appeared first on WeLiveSecurity

Fantasy – a new Agrius wiper deployed through a supply‑chain attack

By Adam Burgher

ESET researchers analyzed a supply-chain attack abusing an Israeli software developer to deploy Fantasy, Agrius’s new wiper, with victims including the diamond industry

The post Fantasy – a new Agrius wiper deployed through a supply‑chain attack appeared first on WeLiveSecurity

Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities

By Dominik Breitenbacher

ESET researchers discovered a spearphishing campaign targeting Japanese political entities a few weeks before the House of Councillors elections, and in the process uncovered a previously undescribed MirrorFace credential stealer

The post Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities appeared first on WeLiveSecurity

The world’s most common passwords: What to do if yours is on the list

By Phil Muncaster

Do you use any of these extremely popular – and eminently hackable – passwords? If so, we have a New Year’s resolution for you.

The post The world’s most common passwords: What to do if yours is on the list appeared first on WeLiveSecurity

StrongPity espionage campaign targeting Android users

By Lukas Stefanko

ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version

The post StrongPity espionage campaign targeting Android users appeared first on WeLiveSecurity

Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit

By Rene Holt

ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA

The post Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit appeared first on WeLiveSecurity

Top 10 Venmo scams: Don’t fall for these common tricks

By Phil Muncaster

Here's what to know about some of the most common ploys that scammers use on the payment app

The post Top 10 Venmo scams: Don’t fall for these common tricks appeared first on WeLiveSecurity

Tech support scammers are still at it: Here’s what to look out for in 2023

By Phil Muncaster

Hello, is it me you’re looking for? Fraudsters still want to help you 'fix' a computer problem you never had in the first place.

The post Tech support scammers are still at it: Here’s what to look out for in 2023 appeared first on WeLiveSecurity

Mastodon vs. Twitter: Know the differences

By André Lameiras

Looking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare to each other.

The post Mastodon vs. Twitter: Know the differences appeared first on WeLiveSecurity

Why your data is more valuable than you may realize

By Tony Anscombe

The data trail you leave behind whenever you're online is bigger – and more revealing – than you may think

The post Why your data is more valuable than you may realize appeared first on WeLiveSecurity

SwiftSlicer: New destructive wiper malware strikes Ukraine

By Editor

Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country

The post SwiftSlicer: New destructive wiper malware strikes Ukraine appeared first on WeLiveSecurity

ESET APT Activity Report T3 2022

By Jean-Ian Boutin

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022

The post ESET APT Activity Report T3 2022 appeared first on WeLiveSecurity

Less is more: Conquer your digital clutter before it conquers you

By Phil Muncaster

Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security

The post Less is more: Conquer your digital clutter before it conquers you appeared first on WeLiveSecurity

Are online surveys legit and safe? Watch out for survey scams

By Phil Muncaster

“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any surveys online

The post Are online surveys legit and safe? Watch out for survey scams appeared first on WeLiveSecurity

Into the void: Your tech and security in digital darkness

By Aryeh Goretsky

No internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications of being plunged into digital darkness.

The post Into the void: Your tech and security in digital darkness appeared first on WeLiveSecurity

ESET Threat Report T3 2022

By Roman Kovac

A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

The post ESET Threat Report T3 2022 appeared first on WeLiveSecurity

❌