In celebration of the International Day of Friendship, we want to help you spot undesirable 'friends' on Facebook.
The post Get rid of these undesirable ‘friends’ on Facebook appeared first on We Live Security.
Brought by: http://foodonia.com
http://foodonia.com جميع وصفات الطعام في مكان واحد طبخ اكلات حسب الطبق اطباق رئيسيه جانبيه سلطات ورجيم اكل وجبات اطفال صحية غذاء صحى معلومه غذائيه مفيدة طبق عربي مصريه لبنانية فرنسية ايطاليه مكسيكيه والصينيه هنديه صحي
In celebration of the International Day of Friendship, we want to help you spot undesirable 'friends' on Facebook.
The post Get rid of these undesirable ‘friends’ on Facebook appeared first on We Live Security.
Celebrating the 17th annual SysAdmin Day, we recognize their dedication and workplace contributions and want to show appreciation for their talent.
The post The 10 Security Commandments for every SysAdmin appeared first on We Live Security.
Security professionals are more concerned than ever by the threat of cybercrime, according to new poll.
The post Security professionals ‘extremely concerned’ by cybercrime threat appeared first on We Live Security.
The Information Security Forum (ISF) has published a major update to its Standard of Good Practice for Information Security.
The post ISF publishes major update to its information security guide appeared first on We Live Security.
In the spirit of this year’s Olympics, which is being held in Rio de Janeiro, we thought we’d host our own little information security Olympic Games.
The post 5 highlights from the ‘information security Olympic Games’ appeared first on We Live Security.
Around eight in every 10 cybersecurity executives admit their company has been compromised by a cyberattack in the past 24 months.
The post Cyberattacks affect ‘nearly every single company’ appeared first on We Live Security.
Cyberbullying is an issue causing havoc in schools across the world, but a Finnish scheme created in 2009 is making a big difference.
The post Finland – hope in the fight against cyberbullying appeared first on We Live Security.
The auto industry has published its first set of cybersecurity best practices, as it attempts to combat rising and future threats facing the connected car.
The post Auto industry publishes first ever cybersecurity best practices appeared first on We Live Security.
Vulnerable version of vBulletin thought to be responsible for data breach which could impact almost 1.6 million game players.
The post Clash of Kings forum hacked, 1.6 million account details put at risk appeared first on We Live Security.
When it comes to disposing of hardware, businesses must take responsibility for ensuring personal data are safely removed.
The post The data protection dustbin: Safely disposing of personal data appeared first on We Live Security.
At Comic-Con 2016, ESET's Anna Keeve dives deep into the "real" world of Mr. Robot, has a VR adventure, and looks for cybersecurity clues in Elliot's room.
The post Researching Mr. Robot, Elliot’s world, and cybersecurity at Comic-Con appeared first on We Live Security.
When it comes to APAC cybersecurity, there is room for improvement. In this feature we take a look at key trends across this region.
The post APAC cybersecurity: Plenty of room for improvements appeared first on We Live Security.
Restaurant chain Cicis has released a statement informing customers of a data breach experienced in some of its restaurants across the US.
The post Cicis restaurant chain experiences data breach appeared first on We Live Security.
One of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET's Josep Albors.
The post Analyzing Mr. Robot: S02E01 appeared first on We Live Security.
Make sure that all your Apple devices are patched before online criminals attempt to take advantage of this flaw.
The post Users of iPhones and Macs must update to avoid Stagefright-like bug appeared first on We Live Security.
The Library of Congress in the US has experienced a distributed denial of service (DDoS) attack, it revealed via social media. Also affected was the US Copyright Office.
The post Library of Congress experiences DDoS attack appeared first on We Live Security.
Beware jackware, malicious software that seeks to take control of a device, the primary purpose of which is not data processing or digital communications.
The post Jackware: When connected cars meet ransomware appeared first on We Live Security.
Malicious scripts are gaining prevalence in Brazil, reports ESET's Matías Porolli.
The post Malicious scripts gaining prevalence in Brazil appeared first on We Live Security.
A major data breach on the Ubuntu Forums has not compromised the passwords of its affected users. Usernames, emails addresses and IPs have been exposed.
The post Passwords not compromised by Ubuntu Forums data breach appeared first on We Live Security.
Both the OurMine and PoodleCorp hacking gangs appear to be taking credit for Pokémon GO being offline over the weekend.
But might there be a more down-to-earth explanation?
The post Pokémon GO goes down. Hackers claim responsibility appeared first on We Live Security.
A smarter approach to password security is needed to help prevent cybercriminals from easily accessing our accounts and stealing personal information.
The post A smarter approach to password security ‘needed’ appeared first on We Live Security.
Security includes firefighting and compliance as well as systems and network management, but should the same people do it all?
The post Firefighting, security and compliance appeared first on We Live Security.
The world is going crazy for Pokémon GO. Here are some top tips from ESET's Lysa Myers on how to enjoy this latest sensation safely.
The post Top tips on how to use Pokémon GO safely appeared first on We Live Security.
In 1999, David L. Smith launched the Melissa virus. Within a few hours, it had infected thousands of computers. We take a look back at its impact.
The post Flashback Friday: The Melissa virus appeared first on We Live Security.
ESET has discovered the first ever fake lockscreen app on Google Play, named Pokemon GO Ultimate. As its characteristics suggest, it deliberately locks the screen right after the app is started forcing the user to restart the device.
The post Pokémon GO hype: First lockscreen tries to catch the trend appeared first on We Live Security.
ESET has discovered eight fake applications on Google Play, which were promising to boost the number of followers on users’ social network profiles. Our security software is detecting these as Android/Fasurke.
The post Fake apps on Google Play tricked users into paying instead of delivering promised followers appeared first on We Live Security.
Ahead of this year's Comic-Con in San Diego, ESET's Aryeh Goretsky has put together a handy travel, security and privacy guide.
The post Comic-Con: Travel, safety and privacy guide appeared first on We Live Security.
Since 2015, thousands of aspiring Pokémon trainers have been waiting for the release of Pokémon GO, which has just launched. Watch out for fakes.
The post Were you planning on downloading the Pokémon GO APK? Bewarer fake versions! appeared first on We Live Security.
During the first half of this year, ESET has observed an increase in the number of detections of Nymaim, a long-known malware family whose prevalence has fallen markedly since 2014.
The post Nymaim rides again in 2016 and reaches Brazil appeared first on We Live Security.
We Live Security begins a new series of articles showing the different angles that can be taken when tackling a pentest.
The post Hi, I’m the enemy: Different perspectives on a pentest appeared first on We Live Security.
Fast food giant Wendy's says that it now believes that more than 1000 of its restaurants across the United States have fallen victim to a hacking gang, who used malware to steal customers' credit and debit card information.
The post Over 1000 Wendy’s restaurants hacked – customers’ credit card details stolen appeared first on We Live Security.
Organizations need to better understand how “ruthless and efficient” cybercriminals are, according to a new report from BT and KPMG.
The post ‘Ruthless’ cybercriminals pose a major threat to organizations appeared first on We Live Security.
We Live Security delves deeper into VPN networks, asking how do they work? And what are the most common types of VPN that can be implemented?
The post Types of VPN networks and how they work: do you know which kind to use? appeared first on We Live Security.
Over the past year, cases of ransomware have gained prominence in the field of computer security due to a notable growth in the number of victims. This is, in turn, due to the significant profits that cybercriminals can obtain from this type of malicious campaign.
The post Ransomware: First files … now complete devices appeared first on We Live Security.
For the last few weeks, ESET has been investigating OSX/Keydnap, a malware that steals the content of the keychain while maintaining a permanent backdoor.
The post New OSX/Keydnap malware is hungry for credentials appeared first on We Live Security.
A 28 year-old Chicago man has pleaded guilty to using phishing scams to illegally access into more than 300 iCloud and Gmail accounts, around 30 of which belonged to celebrities.
The post Chicago man pleads guilty in celebrity iCloud data breach appeared first on We Live Security.
When it comes to data leaks, what are the major weak spots you need to be looking out for? This feature explores three common causes.
The post Data leak dangers: Know your weak spots appeared first on We Live Security.
Welcome to this week’s security review, including a closer look at cash machine security as ATMs turn 49 years old.
The post The security review: How secure are our cash machines? appeared first on We Live Security.
Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit.
The post Espionage toolkit targeting Central and Eastern Europe uncovered appeared first on We Live Security.
Fansmitter, a new malware with the capability to extract data from air-gapped computers, has been developed by scientists in Israel.
The post ‘Fansmitter’ malware can extract data from air-gapped computers appeared first on We Live Security.