2016/07/29

Get rid of these undesirable ‘friends’ on Facebook | foodonia

In celebration of the International Day of Friendship, we want to help you spot undesirable 'friends' on Facebook.

The post Get rid of these undesirable ‘friends’ on Facebook appeared first on We Live Security.



Brought by: http://foodonia.com

The 10 Security Commandments for every SysAdmin | foodonia

Celebrating the 17th annual SysAdmin Day, we recognize their dedication and workplace contributions and want to show appreciation for their talent.

The post The 10 Security Commandments for every SysAdmin appeared first on We Live Security.



Brought by: http://foodonia.com

Security professionals ‘extremely concerned’ by cybercrime threat | foodonia

Security professionals are more concerned than ever by the threat of cybercrime, according to new poll.

The post Security professionals ‘extremely concerned’ by cybercrime threat appeared first on We Live Security.



Brought by: http://foodonia.com

2016/07/25

Auto industry publishes first ever cybersecurity best practices | foodonia

The auto industry has published its first set of cybersecurity best practices, as it attempts to combat rising and future threats facing the connected car.

The post Auto industry publishes first ever cybersecurity best practices appeared first on We Live Security.



Brought by: http://foodonia.com

Clash of Kings forum hacked, 1.6 million account details put at risk | foodonia

Vulnerable version of vBulletin thought to be responsible for data breach which could impact almost 1.6 million game players.

The post Clash of Kings forum hacked, 1.6 million account details put at risk appeared first on We Live Security.



Brought by: http://foodonia.com

The data protection dustbin: Safely disposing of personal data | foodonia

When it comes to disposing of hardware, businesses must take responsibility for ensuring personal data are safely removed.

The post The data protection dustbin: Safely disposing of personal data appeared first on We Live Security.



Brought by: http://foodonia.com

2016/07/21

Cicis restaurant chain experiences data breach | foodonia

Restaurant chain Cicis has released a statement informing customers of a data breach experienced in some of its restaurants across the US.

The post Cicis restaurant chain experiences data breach appeared first on We Live Security.



Brought by: http://foodonia.com

Analyzing Mr. Robot: S02E01 | foodonia

One of the surprises of last year for everyone working in IT security was, without a doubt, the hit TV show Mr. Robot, explains ESET's Josep Albors.

The post Analyzing Mr. Robot: S02E01 appeared first on We Live Security.



Brought by: http://foodonia.com

Users of iPhones and Macs must update to avoid Stagefright-like bug | foodonia

Make sure that all your Apple devices are patched before online criminals attempt to take advantage of this flaw.

The post Users of iPhones and Macs must update to avoid Stagefright-like bug appeared first on We Live Security.



Brought by: http://foodonia.com

2016/07/18

Pokémon GO goes down. Hackers claim responsibility | foodonia

Both the OurMine and PoodleCorp hacking gangs appear to be taking credit for Pokémon GO being offline over the weekend.

But might there be a more down-to-earth explanation?

The post Pokémon GO goes down. Hackers claim responsibility appeared first on We Live Security.



Brought by: http://foodonia.com

A smarter approach to password security ‘needed’ | foodonia

A smarter approach to password security is needed to help prevent cybercriminals from easily accessing our accounts and stealing personal information.

The post A smarter approach to password security ‘needed’ appeared first on We Live Security.



Brought by: http://foodonia.com

Firefighting, security and compliance | foodonia

Security includes firefighting and compliance as well as systems and network management, but should the same people do it all?

The post Firefighting, security and compliance appeared first on We Live Security.



Brought by: http://foodonia.com

Top tips on how to use Pokémon GO safely | foodonia

The world is going crazy for Pokémon GO. Here are some top tips from ESET's Lysa Myers on how to enjoy this latest sensation safely.

The post Top tips on how to use Pokémon GO safely appeared first on We Live Security.



Brought by: http://foodonia.com

2016/07/15

Flashback Friday: The Melissa virus | foodonia

In 1999, David L. Smith launched the Melissa virus. Within a few hours, it had infected thousands of computers. We take a look back at its impact.

The post Flashback Friday: The Melissa virus appeared first on We Live Security.



Brought by: http://foodonia.com

Pokémon GO hype: First lockscreen tries to catch the trend | foodonia

ESET has discovered the first ever fake lockscreen app on Google Play, named Pokemon GO Ultimate. As its characteristics suggest, it deliberately locks the screen right after the app is started forcing the user to restart the device.

The post Pokémon GO hype: First lockscreen tries to catch the trend appeared first on We Live Security.



Brought by: http://foodonia.com

2016/07/12

2016/07/07

‘Ruthless’ cybercriminals pose a major threat to organizations | foodonia

Organizations need to better understand how “ruthless and efficient” cybercriminals are, according to a new report from BT and KPMG.

The post ‘Ruthless’ cybercriminals pose a major threat to organizations appeared first on We Live Security.



Brought by: http://foodonia.com

Types of VPN networks and how they work: do you know which kind to use? | foodonia

We Live Security delves deeper into VPN networks, asking how do they work? And what are the most common types of VPN that can be implemented?

The post Types of VPN networks and how they work: do you know which kind to use? appeared first on We Live Security.



Brought by: http://foodonia.com

Ransomware: First files … now complete devices | foodonia

Over the past year, cases of ransomware have gained prominence in the field of computer security due to a notable growth in the number of victims. This is, in turn, due to the significant profits that cybercriminals can obtain from this type of malicious campaign.

The post Ransomware: First files … now complete devices appeared first on We Live Security.



Brought by: http://foodonia.com