FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayWeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool

Employee monitoring: Is ‘bossware’ right for your company?

By Phil Muncaster

While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees

The post Employee monitoring: Is ‘bossware’ right for your company? appeared first on WeLiveSecurity

Maltego: Check how exposed you are online

By Sol González

A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources

The post Maltego: Check how exposed you are online appeared first on WeLiveSecurity

Turning on stealth mode: 5 simple strategies for staying under the radar online

By André Lameiras

Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details

The post Turning on stealth mode: 5 simple strategies for staying under the radar online appeared first on WeLiveSecurity

Alexa, who else is listening?

By Jake Moore

Your smart speaker is designed to listen, but could it be eavesdropping too?

The post Alexa, who else is listening? appeared first on WeLiveSecurity

Less is more: Conquer your digital clutter before it conquers you

By Phil Muncaster

Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security

The post Less is more: Conquer your digital clutter before it conquers you appeared first on WeLiveSecurity

Why your data is more valuable than you may realize

By Tony Anscombe

The data trail you leave behind whenever you're online is bigger – and more revealing – than you may think

The post Why your data is more valuable than you may realize appeared first on WeLiveSecurity

Tor vs. VPN: Which should you choose?

By André Lameiras

Both Tor and a VPN can greatly help you keep prying eyes away from your online life, but they’re also two very different beasts. Which suits your needs better?

The post Tor vs. VPN: Which should you choose? appeared first on WeLiveSecurity

Hacking baby monitors can be child’s play: Here’s how to stay safe

By Phil Muncaster

Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk

The post Hacking baby monitors can be child’s play: Here’s how to stay safe appeared first on WeLiveSecurity

The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs

By Phil Muncaster

Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras to put your worries to rest.

The post The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs appeared first on WeLiveSecurity

Hey WeLiveSecurity, how does biometric authentication work?

By André Lameiras

Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?

The post Hey WeLiveSecurity, how does biometric authentication work? appeared first on WeLiveSecurity

How to take control over your digital legacy

By André Lameiras

Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.

The post How to take control over your digital legacy appeared first on WeLiveSecurity

What is doxing and how to protect yourself

By André Lameiras

Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you

The post What is doxing and how to protect yourself appeared first on WeLiveSecurity

Is your personal data all over the internet? 7 steps to cleaning up your online presence

By André Lameiras

You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps

The post Is your personal data all over the internet? 7 steps to cleaning up your online presence appeared first on WeLiveSecurity

Crypto mixers: What are they and how are they used?

By Sol González

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

RSA – Creepy real‑world edition

By Cameron Camp

Digital fiddling somehow got mixed up in a real war

The post RSA – Creepy real‑world edition appeared first on WeLiveSecurity

RSA – Spot the real fake

By Cameron Camp

How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer

The post RSA – Spot the real fake appeared first on WeLiveSecurity

❌