FreshRSS

🔒
☐ ☆ ✇ WeLiveSecurity

Start as you mean to go on: the top 10 steps to securing your new computer

By Phil Muncaster — August 2nd 2022 at 09:30

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.

The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Don’t get singed by scammers while you’re carrying the torch for Tinder 

By André Lameiras — August 4th 2022 at 09:30

Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.

The post Don’t get singed by scammers while you’re carrying the torch for Tinder  appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Build a zero‑trust environment to protect your organization – Week in security with Tony Anscombe

By Editor — August 5th 2022 at 12:00

Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.

The post Build a zero‑trust environment to protect your organization – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How to check if your PC has been hacked – and what to do next

By Phil Muncaster — August 9th 2022 at 09:30

Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.

The post How to check if your PC has been hacked – and what to do next appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

An eighties classic – Zero Trust

By Tony Anscombe — August 11th 2022 at 16:00

A deep-dive into zero trust to help you navigate the threat landscape in a zero-trust world and further secure your organization

The post An eighties classic – Zero Trust appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Safety first: how to tweak the settings on your dating apps

By André Lameiras — August 12th 2022 at 09:30

Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.

The post Safety first: how to tweak the settings on your dating apps appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat 2022 – Cyberdefense in a global threats era

By Tony Anscombe — August 12th 2022 at 12:30

Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.

The post Black Hat 2022 – Cyberdefense in a global threats era appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The potential consequences of a data breach – Week in security with Tony Anscombe

By Editor — August 12th 2022 at 16:25

The NHS falls victim to an apparent cyberattack, which raises the question of the impact that data breaches have on people's personal data

The post The potential consequences of a data breach – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat – Windows isn’t the only mass casualty platform anymore

By Cameron Camp — August 15th 2022 at 09:30

Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars

The post Black Hat – Windows isn’t the only mass casualty platform anymore appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Black Hat USA 2022: Burnout, a significant issue

By Tony Anscombe — August 15th 2022 at 10:30

The digital skills gap, especially in cybersecurity, is not a new phenomenon, with the problem now further exacerbated by the prevalence of burnout

The post Black Hat USA 2022: Burnout, a significant issue appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How a spoofed email passed the SPF check and landed in my inbox

By Rene Holt — August 16th 2022 at 09:30

The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain

The post How a spoofed email passed the SPF check and landed in my inbox appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

DEF CON – “don’t worry, the elections are safe” edition

By Cameron Camp — August 16th 2022 at 12:30

Don't worry, elections are safe – this is just one highlight from the DEF CON 30 conference.

The post DEF CON – “don’t worry, the elections are safe” edition appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

A step‑by‑step guide to enjoying LinkedIn safely

By André Lameiras — August 18th 2022 at 09:30

LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.

The post A step‑by‑step guide to enjoying LinkedIn safely appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Google and Apple release patches for zero‑day flaws – Week in security with Tony Anscombe

By Editor — August 19th 2022 at 16:45

Both tech giants rush to release fixes for security vulnerabilities that were being exploited in-the-wild

The post Google and Apple release patches for zero‑day flaws – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Is your personal data all over the internet? 7 steps to cleaning up your online presence

By André Lameiras — August 23rd 2022 at 09:30

You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps

The post Is your personal data all over the internet? 7 steps to cleaning up your online presence appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What is doxing and how to protect yourself

By André Lameiras — August 25th 2022 at 09:30

Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you

The post What is doxing and how to protect yourself appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

French hospital crippled by cyberattack – Week in security with Tony Anscombe

By Editor — August 26th 2022 at 15:00

As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts

The post French hospital crippled by cyberattack – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

TikShock: Don’t get caught out by these 5 TikTok scams

By Jake Moore — August 30th 2022 at 09:30

Are you aware of the perils of the world’s no. 1 social media? Do you know how to avoid scams and stay safe on TikTok?

The post TikShock: Don’t get caught out by these 5 TikTok scams appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How to take control over your digital legacy

By André Lameiras — August 31st 2022 at 09:30

Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.

The post How to take control over your digital legacy appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Will cyber‑insurance pay out? – Week in security with Tony Anscombe

By Editor — September 2nd 2022 at 13:30

What if your organization is hit by a cyberattack that is attributed to a nation state? Would your insurance cover the costs of the attack?

The post Will cyber‑insurance pay out? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Worok: The big picture

By Thibaut Passilly — September 6th 2022 at 09:30

Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files

The post Worok: The big picture appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RDP on the radar: An up‑close view of evolving remote access threats

By Aryeh Goretsky — September 7th 2022 at 09:30

Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol

The post RDP on the radar: An up‑close view of evolving remote access threats appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Toys behaving badly: How parents can protect their family from IoT threats

By Phil Muncaster — September 8th 2022 at 09:30

It pays to do some research before taking a leap into the world of internet-connected toys

The post Toys behaving badly: How parents can protect their family from IoT threats appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe

By Editor — September 9th 2022 at 13:30

Worok takes aim at various high-profile organizations that operate in multiple sectors and are located primarily in Asia

The post ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Why is my Wi‑Fi slow and how do I make it faster?

By Phil Muncaster — September 13th 2022 at 09:30

Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up.

The post Why is my Wi‑Fi slow and how do I make it faster? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

You never walk alone: The SideWalk backdoor gets a Linux variant

By Vladislav Hrčka — September 14th 2022 at 09:30

ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor

The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

SparklingGoblin deploys new Linux backdoor – Week in security, special edition

By Editor — September 15th 2022 at 07:30

ESET Research first spotted this variant of the SideWalk backdoor in the network of a Hong Kong university in February 2021

The post SparklingGoblin deploys new Linux backdoor – Week in security, special edition appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Third‑party cookies: How they work and how to stop them from tracking you across the web

By Rene Holt — September 15th 2022 at 09:30

Cross-site tracking cookies have a bleak future but can still cause privacy woes to unwary users

The post Third‑party cookies: How they work and how to stop them from tracking you across the web appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Rising to the challenges of secure coding – Week in security with Tony Anscombe

By Editor — September 16th 2022 at 14:45

The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products

The post Rising to the challenges of secure coding – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Can your iPhone be hacked? What to know about iOS security

By André Lameiras — September 19th 2022 at 09:30

Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device

The post Can your iPhone be hacked? What to know about iOS security appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Hey WeLiveSecurity, how does biometric authentication work?

By André Lameiras — September 22nd 2022 at 09:30

Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?

The post Hey WeLiveSecurity, how does biometric authentication work? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 tips to help children navigate the internet safely

By André Lameiras — September 23rd 2022 at 09:30

The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits?

The post 5 tips to help children navigate the internet safely appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What to consider before disposing of personal data – Week in security with Tony Anscombe

By Editor — September 23rd 2022 at 19:20

A major financial services company has learned the hard way about the importance of proper disposal of customers' personal data

The post What to consider before disposing of personal data – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What happens with a hacked Instagram account – and how to recover it

By Jake Moore — September 26th 2022 at 09:30

Had your Instagram account stolen? Don’t panic – here’s how to get your account back and how to avoid getting hacked (again)

The post What happens with a hacked Instagram account – and how to recover it appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Protecting teens from sextortion: What parents should know

By Phil Muncaster — September 28th 2022 at 09:30

Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online

The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium

By Peter Kálnai — September 30th 2022 at 10:00

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers

The post Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET research into new attacks by Lazarus – Week in security with Tony Anscombe

By Editor — September 30th 2022 at 14:10

The attack involved the first recorded abuse of a security vulnerability in a Dell driver that was patched in May 2021

The post ESET research into new attacks by Lazarus – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

8 questions to ask yourself before getting a home security camera

By Phil Muncaster — October 3rd 2022 at 09:30

As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?

The post 8 questions to ask yourself before getting a home security camera appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Threat Report T2 2022

By Roman Kovac — October 5th 2022 at 09:30

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The need to change cybersecurity for the next generation

By Tony Anscombe — October 6th 2022 at 09:30

Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits

The post The need to change cybersecurity for the next generation appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe

By Editor — October 7th 2022 at 14:15

A look back on the key trends and developments that shaped the cyberthreat landscape from May to August of this year

The post Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Steam account hacked? Here’s how to get it back

By Martina López — October 10th 2022 at 09:30

What are the warning signs that someone has hijacked your Steam account? Here is what to look for and what you can do to get your account back.

The post Steam account hacked? Here’s how to get it back appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

POLONIUM targets Israel with Creepy malware

By Matías Porolli — October 11th 2022 at 09:30

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group

The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

10 common Zelle scams – and how to avoid them

By Phil Muncaster — October 12th 2022 at 09:30

Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep your money safe while using the popular P2P payment service.

The post 10 common Zelle scams – and how to avoid them appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Life in pursuit of answers: In the words of Ada Yonath

By Alžbeta Kovaľová — October 13th 2022 at 09:30

From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell.

The post Life in pursuit of answers: In the words of Ada Yonath appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe

By Editor — October 14th 2022 at 10:00

More than a dozen organizations operating in various verticals were attacked by the threat actor

The post ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 steps to protect your school from cyberattacks

By André Lameiras — October 17th 2022 at 09:30

What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay?

The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Don’t get scammed when buying tickets online

By Jake Moore — October 19th 2022 at 09:30

With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force

The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Domestic Kitten campaign spying on Iranian citizens with new FurBall malware

By Lukas Stefanko — October 20th 2022 at 09:30

APT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app

The post Domestic Kitten campaign spying on Iranian citizens with new FurBall malware appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe

By Editor — October 21st 2022 at 13:15

ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign

The post APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 reasons to keep your software and devices up to date

By Phil Muncaster — October 24th 2022 at 09:30

Next time you're tempted to hold off on installing software updates, remember why these updates are necessary in the first place

The post 5 reasons to keep your software and devices up to date appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Parcel delivery scams are on the rise: Do you know what to watch out for?

By Phil Muncaster — October 26th 2022 at 09:30

As package delivery scams that spoof DHL, USPS and other delivery companies soar, here’s how to stay safe not just this shopping season

The post Parcel delivery scams are on the rise: Do you know what to watch out for? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Why your phone is slow – and how to speed it up

By André Lameiras — October 27th 2022 at 09:30

You probably don’t have to ditch your phone just yet – try these simple tips and tricks to make any Android device or iPhone run faster

The post Why your phone is slow – and how to speed it up appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Courts vs. cybercrime – Week in security with Tony Anscombe

By Editor — October 28th 2022 at 15:00

A look at a recent string of law enforcement actions directed against (in some cases suspected) perpetrators of various types of cybercrime

The post Courts vs. cybercrime – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween

By André Lameiras — October 31st 2022 at 10:30

Gather around, folks, to learn about some of the ghastliest tricks used by criminals online and how you can avoid security horrors this Halloween and beyond

The post Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs

By Phil Muncaster — November 1st 2022 at 10:30

Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras to put your worries to rest.

The post The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The future starts now: 10 major challenges facing cybersecurity

By Juan Manuel Harán — November 3rd 2022 at 10:30

To mark Antimalware Day, we’ve rounded up some of the most pressing issues for cybersecurity now and in the future

The post The future starts now: 10 major challenges facing cybersecurity appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Ransomware rages on – Week in security with Tony Anscombe

By Editor — November 4th 2022 at 13:30

This week's news offered fresh reminders of the threat that ransomware poses for businesses and critical infrastructure worldwide

The post Ransomware rages on – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Hacking baby monitors can be child’s play: Here’s how to stay safe

By Phil Muncaster — November 7th 2022 at 10:30

Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk

The post Hacking baby monitors can be child’s play: Here’s how to stay safe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

10 common security mistakes and how to avoid them

By Phil Muncaster — November 9th 2022 at 10:30

Do you put yourself at greater risk for successful attacks by making one of these security mistakes?

The post 10 common security mistakes and how to avoid them appeared first on WeLiveSecurity

❌