FreshRSS

🔒
☐ ☆ ✇ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

May 26th 2023 at 16:15
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
☐ ☆ ✇ WeLiveSecurity

Employee monitoring: Is ‘bossware’ right for your company?

By Phil Muncaster — June 29th 2023 at 09:30

While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees

The post Employee monitoring: Is ‘bossware’ right for your company? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Maltego: Check how exposed you are online

By Sol González — June 22nd 2023 at 09:30

A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources

The post Maltego: Check how exposed you are online appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Turning on stealth mode: 5 simple strategies for staying under the radar online

By André Lameiras — May 10th 2023 at 09:30

Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details

The post Turning on stealth mode: 5 simple strategies for staying under the radar online appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Alexa, who else is listening?

By Jake Moore — February 9th 2023 at 10:30

Your smart speaker is designed to listen, but could it be eavesdropping too?

The post Alexa, who else is listening? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Less is more: Conquer your digital clutter before it conquers you

By Phil Muncaster — February 1st 2023 at 10:30

Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security

The post Less is more: Conquer your digital clutter before it conquers you appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Why your data is more valuable than you may realize

By Tony Anscombe — January 26th 2023 at 10:30

The data trail you leave behind whenever you're online is bigger – and more revealing – than you may think

The post Why your data is more valuable than you may realize appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Tor vs. VPN: Which should you choose?

By André Lameiras — November 18th 2022 at 10:30

Both Tor and a VPN can greatly help you keep prying eyes away from your online life, but they’re also two very different beasts. Which suits your needs better?

The post Tor vs. VPN: Which should you choose? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Hacking baby monitors can be child’s play: Here’s how to stay safe

By Phil Muncaster — November 7th 2022 at 10:30

Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk

The post Hacking baby monitors can be child’s play: Here’s how to stay safe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs

By Phil Muncaster — November 1st 2022 at 10:30

Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras to put your worries to rest.

The post The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Hey WeLiveSecurity, how does biometric authentication work?

By André Lameiras — September 22nd 2022 at 09:30

Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?

The post Hey WeLiveSecurity, how does biometric authentication work? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How to take control over your digital legacy

By André Lameiras — August 31st 2022 at 09:30

Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.

The post How to take control over your digital legacy appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What is doxing and how to protect yourself

By André Lameiras — August 25th 2022 at 09:30

Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you

The post What is doxing and how to protect yourself appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Is your personal data all over the internet? 7 steps to cleaning up your online presence

By André Lameiras — August 23rd 2022 at 09:30

You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps

The post Is your personal data all over the internet? 7 steps to cleaning up your online presence appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Crypto mixers: What are they and how are they used?

By Sol González — June 20th 2022 at 09:30

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – Creepy real‑world edition

By Cameron Camp — June 9th 2022 at 17:00

Digital fiddling somehow got mixed up in a real war

The post RSA – Creepy real‑world edition appeared first on WeLiveSecurity

❌