FreshRSS

🔒
☐ ☆ ✇ WeLiveSecurity

8 questions to ask yourself before getting a home security camera

By Phil Muncaster — October 3rd 2022 at 09:30

As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?

The post 8 questions to ask yourself before getting a home security camera appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium

By Peter Kálnai — September 30th 2022 at 10:00

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers

The post Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Protecting teens from sextortion: What parents should know

By Phil Muncaster — September 28th 2022 at 09:30

Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online

The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 tips to help children navigate the internet safely

By André Lameiras — September 23rd 2022 at 09:30

The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits?

The post 5 tips to help children navigate the internet safely appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Can your iPhone be hacked? What to know about iOS security

By André Lameiras — September 19th 2022 at 09:30

Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device

The post Can your iPhone be hacked? What to know about iOS security appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

You never walk alone: The SideWalk backdoor gets a Linux variant

By Vladislav Hrčka — September 14th 2022 at 09:30

ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor

The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Toys behaving badly: How parents can protect their family from IoT threats

By Phil Muncaster — September 8th 2022 at 09:30

It pays to do some research before taking a leap into the world of internet-connected toys

The post Toys behaving badly: How parents can protect their family from IoT threats appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RDP on the radar: An up‑close view of evolving remote access threats

By Aryeh Goretsky — September 7th 2022 at 09:30

Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol

The post RDP on the radar: An up‑close view of evolving remote access threats appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Worok: The big picture

By Thibaut Passilly — September 6th 2022 at 09:30

Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files

The post Worok: The big picture appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

A step‑by‑step guide to enjoying LinkedIn safely

By André Lameiras — August 18th 2022 at 09:30

LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.

The post A step‑by‑step guide to enjoying LinkedIn safely appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

DEF CON – “don’t worry, the elections are safe” edition

By Cameron Camp — August 16th 2022 at 12:30

Don't worry, elections are safe – this is just one highlight from the DEF CON 30 conference.

The post DEF CON – “don’t worry, the elections are safe” edition appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How a spoofed email passed the SPF check and landed in my inbox

By Rene Holt — August 16th 2022 at 09:30

The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain

The post How a spoofed email passed the SPF check and landed in my inbox appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat USA 2022: Burnout, a significant issue

By Tony Anscombe — August 15th 2022 at 10:30

The digital skills gap, especially in cybersecurity, is not a new phenomenon, with the problem now further exacerbated by the prevalence of burnout

The post Black Hat USA 2022: Burnout, a significant issue appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat – Windows isn’t the only mass casualty platform anymore

By Cameron Camp — August 15th 2022 at 09:30

Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars

The post Black Hat – Windows isn’t the only mass casualty platform anymore appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat 2022 – Cyberdefense in a global threats era

By Tony Anscombe — August 12th 2022 at 12:30

Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.

The post Black Hat 2022 – Cyberdefense in a global threats era appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Safety first: how to tweak the settings on your dating apps

By André Lameiras — August 12th 2022 at 09:30

Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.

The post Safety first: how to tweak the settings on your dating apps appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

An eighties classic – Zero Trust

By Tony Anscombe — August 11th 2022 at 16:00

A deep-dive into zero trust to help you navigate the threat landscape in a zero-trust world and further secure your organization

The post An eighties classic – Zero Trust appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Don’t get singed by scammers while you’re carrying the torch for Tinder 

By André Lameiras — August 4th 2022 at 09:30

Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.

The post Don’t get singed by scammers while you’re carrying the torch for Tinder  appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Start as you mean to go on: the top 10 steps to securing your new computer

By Phil Muncaster — August 2nd 2022 at 09:30

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.

The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Staying safe online: How to browse the web securely

By Phil Muncaster — July 29th 2022 at 09:30

Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.

The post Staying safe online: How to browse the web securely appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

NFT: A new‑fangled trend or also a new‑found treasure?

By Jake Moore — July 25th 2022 at 09:30

I’ve created an NFT so you don’t have to – here's the good, the bad and the intangible of the hot-ticket tokens

The post NFT: A new‑fangled trend or also a new‑found treasure? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Research Podcast: Hot security topics at RSA or mostly hype?

By ESET Research — July 20th 2022 at 09:30

Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices

The post ESET Research Podcast: Hot security topics at RSA or mostly hype? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

I see what you did there: A look at the CloudMensis macOS spyware

By Marc-Etienne M.Léveillé — July 19th 2022 at 09:30

Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs

The post I see what you did there: A look at the CloudMensis macOS spyware appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

API security moves mainstream

By Cameron Camp — July 14th 2022 at 09:30

The heavyweights are now moving into API security, cementing it as “A Thing”

The post API security moves mainstream appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Collaboration and knowledge sharing key to progress in cybersecurity

By Juan Manuel Harán — July 13th 2022 at 09:30

In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers

The post Collaboration and knowledge sharing key to progress in cybersecurity appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Play it safe: 5 reasons not to download pirated games

By Phil Muncaster — July 12th 2022 at 09:30

It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games

The post Play it safe: 5 reasons not to download pirated games appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cyberattacks: A very real existential threat to organizations

By Phil Muncaster — July 4th 2022 at 09:30

One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?

The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Do back offices mean backdoors?

By James Shepperd — June 29th 2022 at 09:30

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture

The post Do back offices mean backdoors? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 ways cybercriminals steal credit card details

By Phil Muncaster — June 27th 2022 at 09:30

Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe

The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Virtual private networks: 5 common questions about VPNs answered

By André Lameiras — June 23rd 2022 at 09:30

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask

The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Phishing awareness training: Help your employees avoid the hook

By Phil Muncaster — June 21st 2022 at 09:30

Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders

The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Crypto mixers: What are they and how are they used?

By Sol González — June 20th 2022 at 09:30

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

By Rene Holt — June 16th 2022 at 09:30

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

The post How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security appeared first on WeLiveSecurity

❌