FreshRSS

πŸ”’
☐ β˜† βœ‡ WeLiveSecurity

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

August 2nd 2023 at 12:38
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
☐ β˜† βœ‡ WeLiveSecurity

Quantum computing: Will it break crypto security within a few years?

August 1st 2023 at 09:32
Current cryptographic security methods watch out - quantum computing is coming for your lunch.
☐ β˜† βœ‡ WeLiveSecurity

Gathering dust and data: How robotic vacuums can spy on you

July 26th 2023 at 10:40
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
☐ β˜† βœ‡ WeLiveSecurity

Is backdoor access oppressive? – Week in security with Tony Anscombe

July 28th 2023 at 11:57
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?
☐ β˜† βœ‡ WeLiveSecurity

Gathering dust and data: How robotic vacuums can spy on you.

July 26th 2023 at 10:40
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
☐ β˜† βœ‡ WeLiveSecurity

Dear all, What are some common subject lines in phishing emails?

July 25th 2023 at 09:30
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.
☐ β˜† βœ‡ WeLiveSecurity

Dear all! What are some common subject lines in phishing emails?

July 25th 2023 at 09:30
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.
☐ β˜† βœ‡ WeLiveSecurity

What happens if AI is wrong? – Week in security with Tony Anscombe

July 24th 2023 at 05:11
Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
☐ β˜† βœ‡ WeLiveSecurity

8 common work-from-home scams to avoid

July 24th 2023 at 05:11
That β€˜employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

July 24th 2023 at 05:11
The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions
☐ β˜† βœ‡ WeLiveSecurity

Android GravityRAT goes after WhatsApp backups

July 21st 2023 at 13:29
ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4Β 2022­–Q1 2023

July 21st 2023 at 13:29
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4Β 2022 and Q1Β 2023
☐ β˜† βœ‡ WeLiveSecurity

Passwords out, passkeys in: are you ready to make the switch?

July 21st 2023 at 13:29
With passkeys poised for prime time, passwords seem passΓ©. What are the main benefits of ditching one in favor of the other?
☐ β˜† βœ‡ WeLiveSecurity

The danger within: 5 steps you can take to combat insider threats

July 21st 2023 at 13:29
Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?
☐ β˜† βœ‡ WeLiveSecurity

Hunting down BlackLotus – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
☐ β˜† βœ‡ WeLiveSecurity

What TikTok knows about you – and what you should know about TikTok

July 21st 2023 at 13:29
As TikTok CEO attempts to placate U.S. lawmakers, it’s time for us all to think about the wealth of personal information that TikTok and other social media giants collect about us
☐ β˜† βœ‡ WeLiveSecurity

How the war in Ukraine has been a catalyst in private-public collaborations

July 21st 2023 at 13:29
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
☐ β˜† βœ‡ WeLiveSecurity

10 signs that scammers have you in their sights

July 21st 2023 at 13:29
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

July 21st 2023 at 13:29
The growing use of synthetic media and difficulties in distinguishing between real and fake content raises a slew of legal and ethical questions
☐ β˜† βœ‡ WeLiveSecurity

School’s out for summer, but it’s not time to let your cyber guard down

July 21st 2023 at 13:29
The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits
☐ β˜† βœ‡ WeLiveSecurity

Why you need parental control software – and 5 features to look for

July 21st 2023 at 13:29
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
☐ β˜† βœ‡ WeLiveSecurity

SVB's collapse is a scammer’s dream: Don’t get caught out

July 21st 2023 at 13:29
How cybercriminals can exploit Silicon Valley Bank's downfall for their own ends – and at your expense
☐ β˜† βœ‡ WeLiveSecurity

APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe

July 21st 2023 at 13:29
A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds
☐ β˜† βœ‡ WeLiveSecurity

Staying safe on OnlyFans: The naked truth

July 21st 2023 at 13:29
How content creators and subscribers can embrace the social media platform without (overly) exposing themselves to the potentially toxic brew of NSFW content and privacy threats
☐ β˜† βœ‡ WeLiveSecurity

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

July 21st 2023 at 13:29
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
☐ β˜† βœ‡ WeLiveSecurity

Is a RAT stealing your files? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?
☐ β˜† βœ‡ WeLiveSecurity

Common WhatsApp scams and how to avoid them

July 21st 2023 at 13:29
Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them.
☐ β˜† βœ‡ WeLiveSecurity

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

July 21st 2023 at 13:29
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report T3 2022

July 21st 2023 at 13:29
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
☐ β˜† βœ‡ WeLiveSecurity

You may not care where you download software from, but malware does

July 21st 2023 at 13:29
Why do people still download files from sketchy places and get compromised as a result?
☐ β˜† βœ‡ WeLiveSecurity

One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected?
☐ β˜† βœ‡ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

July 21st 2023 at 13:29
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
☐ β˜† βœ‡ WeLiveSecurity

Confident cybersecurity means fewer headaches for SMBs

July 21st 2023 at 13:29
Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts
☐ β˜† βœ‡ WeLiveSecurity

The real cost of a free lunch – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
☐ β˜† βœ‡ WeLiveSecurity

What are the cybersecurity concerns of SMBs by sector?

July 21st 2023 at 13:29
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured
☐ β˜† βœ‡ WeLiveSecurity

RSA Conference 2023 – How AI will infiltrate the world

July 21st 2023 at 13:29
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications
☐ β˜† βœ‡ WeLiveSecurity

Hear no evil: Ultrasound attacks on voice assistants

July 21st 2023 at 13:29
HowΒ your voice assistant could do the bidding of a hacker – without you ever hearing a thing
☐ β˜† βœ‡ WeLiveSecurity

Discarded, not destroyed: Old routers reveal corporate secrets

July 21st 2023 at 13:29
When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'
☐ β˜† βœ‡ WeLiveSecurity

Will ChatGPT start writing killer malware?

July 21st 2023 at 13:29
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware?
☐ β˜† βœ‡ WeLiveSecurity

'A woman from Mars': Life in the pursuit of space exploration

July 21st 2023 at 13:29
An astrobiologist, analog astronaut, author and speaker, Dr. Michaela Musilova shares her experience as a woman at the forefront of space exploration and from her quest for scientific and personal excellence
☐ β˜† βœ‡ WeLiveSecurity

7 tips for spotting a fake mobile app

July 21st 2023 at 13:29
Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future
☐ β˜† βœ‡ WeLiveSecurity

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

July 21st 2023 at 13:29
ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group
☐ β˜† βœ‡ WeLiveSecurity

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

July 21st 2023 at 13:29
A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities
☐ β˜† βœ‡ WeLiveSecurity

Pig butchering scams: The anatomy of a fast-growing threat

July 21st 2023 at 13:29
How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers
☐ β˜† βœ‡ WeLiveSecurity

What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
A bootkit that ESET researchers have discovered in the wild is the BlackLotus UEFI bootkit that is being peddled on hacking forums
☐ β˜† βœ‡ WeLiveSecurity

APTs target MSP access to customer networks – Week in security with Tony Anscombe

July 21st 2023 at 13:29
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
☐ β˜† βœ‡ WeLiveSecurity

Twitter ends free SMS 2FA: Here’s how you can protect your account now

July 21st 2023 at 13:29
Twitter’s ditching of free text-message authentication doesn’t mean that you should forgo using 2FA. Instead, switch to another – and, indeed, better – 2FA option.
☐ β˜† βœ‡ WeLiveSecurity

Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe

July 21st 2023 at 13:29
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
☐ β˜† βœ‡ WeLiveSecurity

Top 5 search engines for internet-connected devices and services

July 21st 2023 at 13:29
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
☐ β˜† βœ‡ WeLiveSecurity

Emotet: sold or on vacation? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Originally a banking trojan, Emotet later evolved into a full-blown botnet and went on to become one of the most dangerous cyberthreats worldwide
☐ β˜† βœ‡ WeLiveSecurity

Employee monitoring: Is β€˜bossware’ right for your company?

July 21st 2023 at 13:29
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
☐ β˜† βœ‡ WeLiveSecurity

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

July 21st 2023 at 13:29
ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds
☐ β˜† βœ‡ WeLiveSecurity

ESET SMB Digital Security Sentiment Report: The damaging effects of a breach

July 21st 2023 at 13:29
SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached
☐ β˜† βœ‡ WeLiveSecurity

Stop Cyberbullying Day: Prevention is everyone's responsibility

July 21st 2023 at 13:29
Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves
☐ β˜† βœ‡ WeLiveSecurity

World Backup Day: Avoiding a data disaster is a forever topic

July 21st 2023 at 13:29
By failing to prepare you are preparing to fail. Make sure you're able to bounce back if, or when, a data disaster strikes.
☐ β˜† βœ‡ WeLiveSecurity

WinorDLL64: A backdoor from the vast Lazarus arsenal?

July 21st 2023 at 13:29
The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group
☐ β˜† βœ‡ WeLiveSecurity

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

July 21st 2023 at 13:29
ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol
☐ β˜† βœ‡ WeLiveSecurity

Shedding light on AceCryptor and its operation

July 21st 2023 at 13:29
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families
☐ β˜† βœ‡ WeLiveSecurity

Cleaning up your social media and passwords: What to trash and what to treasure

July 21st 2023 at 13:29
Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos
☐ β˜† βœ‡ WeLiveSecurity

Alexa, who else is listening?

July 21st 2023 at 13:29
Your smart speaker is designed to listen, but could it be eavesdropping too?
❌