FreshRSS

🔒
☐ ☆ ✇ WeLiveSecurity

Sandworm uses a new version of ArguePatch to attack targets in Ukraine

By Editor — May 20th 2022 at 17:01

ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks

The post Sandworm uses a new version of ArguePatch to attack targets in Ukraine appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cryptocurrency: secure or not? – Week in security with Tony Anscombe

By Editor — May 20th 2022 at 17:46

When you hear the term ‘cryptocurrency’, does ‘secure’ also spring to mind? Here are some implications of the lack of sound security practices in the world of crypto.

The post Cryptocurrency: secure or not? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Common NFT scams and how to avoid them

By Mario Micucci — May 23rd 2022 at 09:30

As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the industry.

The post Common NFT scams and how to avoid them appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 reasons why GDPR was a milestone for data protection

By André Lameiras — May 25th 2022 at 09:30

The landmark regulation changed everyone’s mindset on how companies worldwide collect and use the personal data of EU citizens

The post 5 reasons why GDPR was a milestone for data protection appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit

By ESET Research — May 26th 2022 at 12:00

Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution

The post ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cybersecurity: A global problem that requires a global answer

By André Lameiras — May 27th 2022 at 09:30

New and exacerbated cyber-risks following Russia’s invasion of Ukraine are fueling a new urgency towards enhancing resilience

The post Cybersecurity: A global problem that requires a global answer appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Scams targeting NFT investors – Week in security with Tony Anscombe

By Editor — May 27th 2022 at 13:30

As with everything digital, there's someone, somewhere devising a method to steal the assets away from their rightful owners

The post Scams targeting NFT investors – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Keeping it real: Don’t fall for lies about the war

By André Lameiras — May 30th 2022 at 09:30

Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what’s in the fake news

The post Keeping it real: Don’t fall for lies about the war appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Talking to children about the internet: A kid’s perspective

By André Lameiras — June 1st 2022 at 09:30

A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet

The post Talking to children about the internet: A kid’s perspective appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Threat Report T 1 2022

By Roman Kovac — June 2nd 2022 at 12:00

A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

The post ESET Threat Report T 1 2022 appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

100 days of war in Ukraine: How the conflict is playing out in cyberspace

By André Lameiras — June 3rd 2022 at 16:00

It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict

The post 100 days of war in Ukraine: How the conflict is playing out in cyberspace appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe

By Editor — June 3rd 2022 at 16:15

A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses

The post Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cybersecurity awareness training: What is it and what works best?

By Phil Muncaster — June 7th 2022 at 09:30

Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk

The post Cybersecurity awareness training: What is it and what works best? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – Spot the real fake

By Cameron Camp — June 7th 2022 at 19:00

How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer

The post RSA – Spot the real fake appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – Digital healthcare meets security, but does it really want to?

By Cameron Camp — June 8th 2022 at 18:30

Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission

The post RSA – Digital healthcare meets security, but does it really want to? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – Creepy real‑world edition

By Cameron Camp — June 9th 2022 at 17:00

Digital fiddling somehow got mixed up in a real war

The post RSA – Creepy real‑world edition appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – APIs, your organization’s dedicated backdoors

By Cameron Camp — June 10th 2022 at 14:30

API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly

The post RSA – APIs, your organization’s dedicated backdoors appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

By Editor — June 10th 2022 at 15:00

Here are three themes that stood out at the world's largest gathering of cybersecurity professionals

The post 3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Industroyer: A cyber‑weapon that brought down a power grid

By André Lameiras — June 13th 2022 at 09:30

Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids

The post Industroyer: A cyber‑weapon that brought down a power grid appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

By Rene Holt — June 16th 2022 at 09:30

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

The post How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How to spot malicious spam – Week in security with Tony Anscombe

By Editor — June 17th 2022 at 16:00

As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam

The post How to spot malicious spam – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Crypto mixers: What are they and how are they used?

By Sol González — June 20th 2022 at 09:30

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Phishing awareness training: Help your employees avoid the hook

By Phil Muncaster — June 21st 2022 at 09:30

Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders

The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Virtual private networks: 5 common questions about VPNs answered

By André Lameiras — June 23rd 2022 at 09:30

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask

The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Instagram’s new age verification tool – Week in security with Tony Anscombe

By Editor — June 24th 2022 at 13:00

As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?

The post Instagram’s new age verification tool – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 ways cybercriminals steal credit card details

By Phil Muncaster — June 27th 2022 at 09:30

Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe

The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Do back offices mean backdoors?

By James Shepperd — June 29th 2022 at 09:30

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture

The post Do back offices mean backdoors? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Costco 40th anniversary scam targets WhatsApp users

By Miguel Ángel Mendoza — June 30th 2022 at 09:30

If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is

The post Costco 40th anniversary scam targets WhatsApp users appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Phishing scam poses as Canadian tax agency before Canada Day

By Rene Holt — July 1st 2022 at 14:36

The lead-up to the Canada Day festivities has brought a tax scam with it

The post Phishing scam poses as Canadian tax agency before Canada Day appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Watch out for survey scams – Week in security with Tony Anscombe

By Editor — July 1st 2022 at 15:00

As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you're dealing with a scam?

The post Watch out for survey scams – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cyberattacks: A very real existential threat to organizations

By Phil Muncaster — July 4th 2022 at 09:30

One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?

The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

8 common Facebook Marketplace scams and how to avoid them

By Phil Muncaster — July 6th 2022 at 09:30

Here’s what to watch out for when buying or selling stuff on the online marketplace and how to tell if you’re being scammed

The post 8 common Facebook Marketplace scams and how to avoid them appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Driving to France this summer? Watch out for scam websites before you go

By Jake Moore — July 8th 2022 at 09:30

Scammers don't take the summer off – be on your guard when buying your Crit'Air sticker

The post Driving to France this summer? Watch out for scam websites before you go appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Avoid travel digital disasters – Week in security with Tony Anscombe

By Editor — July 8th 2022 at 13:30

Vacations are a great time to unwind, but if you're not careful, you may face a digital disaster. Here's how to keep your devices and data secure while you're on the move

The post Avoid travel digital disasters – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Play it safe: 5 reasons not to download pirated games

By Phil Muncaster — July 12th 2022 at 09:30

It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games

The post Play it safe: 5 reasons not to download pirated games appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Collaboration and knowledge sharing key to progress in cybersecurity

By Juan Manuel Harán — July 13th 2022 at 09:30

In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers

The post Collaboration and knowledge sharing key to progress in cybersecurity appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

API security moves mainstream

By Cameron Camp — July 14th 2022 at 09:30

The heavyweights are now moving into API security, cementing it as “A Thing”

The post API security moves mainstream appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Think twice before downloading pirated games – Week in security with Tony Anscombe

By Editor — July 15th 2022 at 14:39

Why downloading pirated video games may ultimately cost you dearly and how to stay safe while gaming online

The post Think twice before downloading pirated games – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

I see what you did there: A look at the CloudMensis macOS spyware

By Marc-Etienne M.Léveillé — July 19th 2022 at 09:30

Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs

The post I see what you did there: A look at the CloudMensis macOS spyware appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Research Podcast: Hot security topics at RSA or mostly hype?

By ESET Research — July 20th 2022 at 09:30

Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices

The post ESET Research Podcast: Hot security topics at RSA or mostly hype? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

macOS malware: myth vs. reality – Week in security with Tony Anscombe

By Editor — July 22nd 2022 at 16:15

ESET research shows yet again that macOS is not immune to malware and why some users can benefit from Apple’s Lockdown Mode

The post macOS malware: myth vs. reality – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

NFT: A new‑fangled trend or also a new‑found treasure?

By Jake Moore — July 25th 2022 at 09:30

I’ve created an NFT so you don’t have to – here's the good, the bad and the intangible of the hot-ticket tokens

The post NFT: A new‑fangled trend or also a new‑found treasure? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cash App fraud: 10 common scams to watch out for

By Phil Muncaster — July 27th 2022 at 09:30

It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash

The post Cash App fraud: 10 common scams to watch out for appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Staying safe online: How to browse the web securely

By Phil Muncaster — July 29th 2022 at 09:30

Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.

The post Staying safe online: How to browse the web securely appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe

By Editor — July 29th 2022 at 17:45

Cybercriminals steal the equivalent of $18M from the NFT music streaming platform Audius, while other cyberthreats related to crypto made the news.

The post Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Start as you mean to go on: the top 10 steps to securing your new computer

By Phil Muncaster — August 2nd 2022 at 09:30

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.

The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Don’t get singed by scammers while you’re carrying the torch for Tinder 

By André Lameiras — August 4th 2022 at 09:30

Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.

The post Don’t get singed by scammers while you’re carrying the torch for Tinder  appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Build a zero‑trust environment to protect your organization – Week in security with Tony Anscombe

By Editor — August 5th 2022 at 12:00

Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.

The post Build a zero‑trust environment to protect your organization – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How to check if your PC has been hacked – and what to do next

By Phil Muncaster — August 9th 2022 at 09:30

Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.

The post How to check if your PC has been hacked – and what to do next appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

An eighties classic – Zero Trust

By Tony Anscombe — August 11th 2022 at 16:00

A deep-dive into zero trust to help you navigate the threat landscape in a zero-trust world and further secure your organization

The post An eighties classic – Zero Trust appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Safety first: how to tweak the settings on your dating apps

By André Lameiras — August 12th 2022 at 09:30

Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.

The post Safety first: how to tweak the settings on your dating apps appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat 2022 – Cyberdefense in a global threats era

By Tony Anscombe — August 12th 2022 at 12:30

Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.

The post Black Hat 2022 – Cyberdefense in a global threats era appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The potential consequences of a data breach – Week in security with Tony Anscombe

By Editor — August 12th 2022 at 16:25

The NHS falls victim to an apparent cyberattack, which raises the question of the impact that data breaches have on people's personal data

The post The potential consequences of a data breach – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat – Windows isn’t the only mass casualty platform anymore

By Cameron Camp — August 15th 2022 at 09:30

Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars

The post Black Hat – Windows isn’t the only mass casualty platform anymore appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat USA 2022: Burnout, a significant issue

By Tony Anscombe — August 15th 2022 at 10:30

The digital skills gap, especially in cybersecurity, is not a new phenomenon, with the problem now further exacerbated by the prevalence of burnout

The post Black Hat USA 2022: Burnout, a significant issue appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How a spoofed email passed the SPF check and landed in my inbox

By Rene Holt — August 16th 2022 at 09:30

The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain

The post How a spoofed email passed the SPF check and landed in my inbox appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

DEF CON – “don’t worry, the elections are safe” edition

By Cameron Camp — August 16th 2022 at 12:30

Don't worry, elections are safe – this is just one highlight from the DEF CON 30 conference.

The post DEF CON – “don’t worry, the elections are safe” edition appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

A step‑by‑step guide to enjoying LinkedIn safely

By André Lameiras — August 18th 2022 at 09:30

LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.

The post A step‑by‑step guide to enjoying LinkedIn safely appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Google and Apple release patches for zero‑day flaws – Week in security with Tony Anscombe

By Editor — August 19th 2022 at 16:45

Both tech giants rush to release fixes for security vulnerabilities that were being exploited in-the-wild

The post Google and Apple release patches for zero‑day flaws – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Is your personal data all over the internet? 7 steps to cleaning up your online presence

By André Lameiras — August 23rd 2022 at 09:30

You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps

The post Is your personal data all over the internet? 7 steps to cleaning up your online presence appeared first on WeLiveSecurity

❌