FreshRSS

🔒
☐ ☆ ✇ WeLiveSecurity

Don’t get singed by scammers while you’re carrying the torch for Tinder 

By André Lameiras — August 4th 2022 at 09:30

Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.

The post Don’t get singed by scammers while you’re carrying the torch for Tinder  appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Start as you mean to go on: the top 10 steps to securing your new computer

By Phil Muncaster — August 2nd 2022 at 09:30

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.

The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Staying safe online: How to browse the web securely

By Phil Muncaster — July 29th 2022 at 09:30

Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.

The post Staying safe online: How to browse the web securely appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

NFT: A new‑fangled trend or also a new‑found treasure?

By Jake Moore — July 25th 2022 at 09:30

I’ve created an NFT so you don’t have to – here's the good, the bad and the intangible of the hot-ticket tokens

The post NFT: A new‑fangled trend or also a new‑found treasure? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

API security moves mainstream

By Cameron Camp — July 14th 2022 at 09:30

The heavyweights are now moving into API security, cementing it as “A Thing”

The post API security moves mainstream appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Collaboration and knowledge sharing key to progress in cybersecurity

By Juan Manuel Harán — July 13th 2022 at 09:30

In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers

The post Collaboration and knowledge sharing key to progress in cybersecurity appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Play it safe: 5 reasons not to download pirated games

By Phil Muncaster — July 12th 2022 at 09:30

It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games

The post Play it safe: 5 reasons not to download pirated games appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cyberattacks: A very real existential threat to organizations

By Phil Muncaster — July 4th 2022 at 09:30

One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?

The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Do back offices mean backdoors?

By James Shepperd — June 29th 2022 at 09:30

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture

The post Do back offices mean backdoors? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 ways cybercriminals steal credit card details

By Phil Muncaster — June 27th 2022 at 09:30

Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe

The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Virtual private networks: 5 common questions about VPNs answered

By André Lameiras — June 23rd 2022 at 09:30

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask

The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Phishing awareness training: Help your employees avoid the hook

By Phil Muncaster — June 21st 2022 at 09:30

Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders

The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Crypto mixers: What are they and how are they used?

By Sol González — June 20th 2022 at 09:30

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

❌