What are some of the key cybersecurity trends and themes that organizations should have on their radars in 2023?
The post Cybersecurity trends and challenges to look out for in 2023 appeared first on WeLiveSecurity
Brought by: http://foodonia.com
http://foodonia.com جميع وصفات الطعام في مكان واحد طبخ اكلات حسب الطبق اطباق رئيسيه جانبيه سلطات ورجيم اكل وجبات اطفال صحية غذاء صحى معلومه غذائيه مفيدة طبق عربي مصريه لبنانية فرنسية ايطاليه مكسيكيه والصينيه هنديه صحي
What are some of the key cybersecurity trends and themes that organizations should have on their radars in 2023?
The post Cybersecurity trends and challenges to look out for in 2023 appeared first on WeLiveSecurity
The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022
The post 2022 in review: 10 of the year’s biggest cyberattacks appeared first on WeLiveSecurity
The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022
The post 2022 in review: 10 of the year’s biggest cyberattacks appeared first on WeLiveSecurity
It’s all fun and games over the holidays, but is your young gamer safe from the darker side of the action?
The post ‘Tis the season for gaming: Keeping children safe (and parents sane) appeared first on WeLiveSecurity
It’s all fun and games over the holidays, but is your young gamer safe from the darker side of the action?
The post ‘Tis the season for gaming: Keeping children safe (and parents sane) appeared first on WeLiveSecurity
Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls
The post How to set up parental controls on your child’s new smartphone appeared first on WeLiveSecurity
Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls
The post How to set up parental controls on your child’s new smartphone appeared first on WeLiveSecurity
The group's proprietary backdoor LODEINFO delivers additional malware, exfiltrates credentials, and steals documents and emails
The post MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The group's proprietary backdoor LODEINFO delivers additional malware, exfiltrates credentials, and steals documents and emails
The post MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The group's proprietary backdoor LODEINFO delivers additional malware, exfiltrates credentials, and steals documents and emails
The post MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them use their new gadget safely and responsibly.
The post Help! My kid has asked Santa for a smartphone appeared first on WeLiveSecurity
The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them use their new gadget safely and responsibly.
The post Help! My kid has asked Santa for a smartphone appeared first on WeLiveSecurity
Holiday travel is back with a vengeance this year. Set yourself up for a cyber-safe and hassle-free trip with our checklist.
The post Traveling for the holidays? Stay cyber‑safe with these tips appeared first on WeLiveSecurity
ESET researchers discovered a spearphishing campaign targeting Japanese political entities a few weeks before the House of Councillors elections, and in the process uncovered a previously undescribed MirrorFace credential stealer
The post Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities appeared first on WeLiveSecurity
Think outside the (gift) box. Here are a few ideas for security and privacy gifts to get for your relatives – or even for yourself. Some don’t cost a penny!
The post Top tips for security‑ and privacy‑enhancing holiday gifts appeared first on WeLiveSecurity
ESET experts offer their reflections on what the continued blurring of boundaries between different spheres of life means for our human and social experience – and especially our cybersecurity and privacy
The post Cybersecurity Trends 2023: Securing our hybrid lives appeared first on WeLiveSecurity
ESET researchers uncover a new wiper and its execution tool, both attributed to the Iran-aligned Agrius APT group
The post Diamond industry under attack – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Xenomorph pilfers victims' login credentials for banking, payment, social media, cryptocurrency and other apps with valuable data
The post Xenomorph: What to know about this Android banking trojan appeared first on WeLiveSecurity
Xenomorph pilfers victims' login credentials for banking, payment, social media, cryptocurrency and other apps with valuable data
The post Xenomorph: What to know about this Android banking trojan appeared first on WeLiveSecurity
ESET researchers analyzed a supply-chain attack abusing an Israeli software developer to deploy Fantasy, Agrius’s new wiper, with victims including the diamond industry
The post Fantasy – a new Agrius wiper deployed through a supply‑chain attack appeared first on WeLiveSecurity
Forget pests for a minute. Modern farms also face another – and more insidious – breed of threat.
The post Tractors vs. threat actors: How to hack a farm appeared first on WeLiveSecurity
Forget pests for a minute. Modern farms also face another – and more insidious – breed of threat.
The post Tractors vs. threat actors: How to hack a farm appeared first on WeLiveSecurity
Deployed against carefully selected targets, the new backdoor combs through the drives of compromised systems for files of interest before exfiltrating them to Google Drive
The post ScarCruft updates its toolset – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Deployed against carefully selected targets, the new backdoor combs through the drives of compromised systems for files of interest before exfiltrating them to Google Drive
The post ScarCruft updates its toolset – Week in security with Tony Anscombe appeared first on WeLiveSecurity
With the rapidly rising energy prices putting a strain on many households, what are some quick wins to help reduce the power consumption of your gadgets?
The post Top tips to save energy used by your electronic devices appeared first on WeLiveSecurity
With the rapidly rising energy prices putting a strain on many households, what are some quick wins to help reduce the power consumption of your gadgets?
The post Top tips to save energy used by your electronic devices appeared first on WeLiveSecurity
ESET researchers uncover Dolphin, a sophisticated backdoor extending the arsenal of the ScarCruft APT group
The post Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin appeared first on WeLiveSecurity
ESET researchers uncover Dolphin, a sophisticated backdoor extending the arsenal of the ScarCruft APT group
The post Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin appeared first on WeLiveSecurity
ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm's fingerprints all over it
The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity
ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm's fingerprints all over it
The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity
The Bahamut APT group distributes at least eight malicious apps that pilfer victims' data and monitor their messages and conversations
The post Spyware posing as VPN apps – Week in security with Tony Anscombe appeared first on WeLiveSecurity
'Tis the season for shopping and if you too are scouting for bargains, make sure to keep your money safe when snapping up those deals
The post Know your payment options: How to shop and pay safely this holiday season appeared first on WeLiveSecurity
'Tis the season for shopping and if you too are scouting for bargains, make sure to keep your money safe when snapping up those deals
The post Know your payment options: How to shop and pay safely this holiday season appeared first on WeLiveSecurity
'Tis the season for shopping and if you too are scouting for bargains, make sure to keep your money safe when snapping up those deals
The post Know your payment options: How to shop and pay safely this holiday season appeared first on WeLiveSecurity
'Tis the season for shopping and if you too are scouting for bargains, make sure to keep your money safe when snapping up those deals
The post Know your payment options: How to shop and pay safely this holiday season appeared first on WeLiveSecurity
It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams doing the rounds this holiday shopping season
The post 10 tips to avoid Black Friday and Cyber Monday scams appeared first on WeLiveSecurity
It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams doing the rounds this holiday shopping season
The post 10 tips to avoid Black Friday and Cyber Monday scams appeared first on WeLiveSecurity
Malicious apps used in this active campaign exfiltrate contacts, SMS messages, recorded phone calls, and even chat messages from apps such as Signal, Viber, and Telegram
The post Bahamut cybermercenary group targets Android users with fake VPN apps appeared first on WeLiveSecurity
Malicious apps used in this active campaign exfiltrate contacts, SMS messages, recorded phone calls, and even chat messages from apps such as Signal, Viber, and Telegram
The post Bahamut cybermercenary group targets Android users with fake VPN apps appeared first on WeLiveSecurity
Do your employees take more risks with valuable data because they’ve become desensitized to security guidance? Spot the symptoms before it’s too late.
The post Security fatigue is real: Here’s how to overcome it appeared first on WeLiveSecurity
What have some of the world's most notorious APT groups been up to lately? A new ESET report released this week has the answers.
The post Latest insights on APT activity – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The convenience with which you manage all your financial wants and needs may come at a cost
The post Open banking: Tell me what you buy, and I’ll tell you who you are appeared first on WeLiveSecurity
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022
The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity
New ESET report shows how ever-growing threats impact SMB sentiment and why many SMBs are underprepared to defend against attacks
The post Security challenges facing SMBs – Week in security with Tony Anscombe appeared first on WeLiveSecurity
When in doubt, kick it out, plus other tips for hardening your cyber-defenses against World Cup-themed phishing and other scams
The post FIFA World Cup 2022 scams: Beware of fake lotteries, ticket fraud and other cons appeared first on WeLiveSecurity
Survey finds SMBs, weary of security failures, curious about detection and response
The post Toward the cutting edge: SMBs contemplating enterprise security appeared first on WeLiveSecurity
Do you make these security mistakes and put yourself at greater risk for successful attacks?
The post 10 common security mistakes and how to avoid them appeared first on WeLiveSecurity
Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk
The post Hacking baby monitors can be child’s play: Here’s how to stay safe appeared first on WeLiveSecurity
This week's news offered fresh reminders of the threat that ransomware poses for businesses and critical infrastructure worldwide
The post Ransomware rages on – Week in security with Tony Anscombe appeared first on WeLiveSecurity
To mark Antimalware Day, we’ve rounded up some of the most pressing issues for cybersecurity now and in the future
The post The future starts now: 10 major challenges facing cybersecurity appeared first on WeLiveSecurity
To mark Antimalware Day, we’ve rounded up some of the most pressing issues for cybersecurity now and in the future
The post The future starts now: 10 major challenges facing cybersecurity appeared first on WeLiveSecurity
Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras and put your worries to rest.
The post The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs appeared first on WeLiveSecurity
Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras and put your worries to rest.
The post The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs appeared first on WeLiveSecurity
Gather around, folks, to learn about some of the ghastliest tricks used by criminals online and how you can avoid security horrors this Halloween and beyond
The post Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween appeared first on WeLiveSecurity
A look at a recent string of law enforcement actions directed against (in some cases suspected) perpetrators of various types of cybercrime
The post Courts vs. cybercrime – Week in security with Tony Anscombe appeared first on WeLiveSecurity
A look at a recent string of law enforcement actions directed against (in some cases suspected) perpetrators of various types of cybercrime
The post Courts vs. cybercrime – Week in security with Tony Anscombe appeared first on WeLiveSecurity
You probably don’t have to ditch your phone just yet – try these simple tips and tricks to make any Android device or iPhone run faster
The post Why your phone is slow – and how to speed it up appeared first on WeLiveSecurity
As package delivery scams that spoof DHL, USPS and other delivery companies soar, here’s how to stay safe not just this shopping season
The post Parcel delivery scams are on the rise: Do you know what to watch out for? appeared first on WeLiveSecurity
As package delivery scams that spoof DHL, USPS and other delivery companies soar, here’s how to stay safe not just this shopping season
The post Parcel delivery scams are on the rise: Do you know what to watch out for? appeared first on WeLiveSecurity
Next time you're tempted to hold off on installing software updates, remember why these updates are necessary in the first place
The post 5 reasons to keep your software and devices up to date appeared first on WeLiveSecurity
Next time you're tempted to hold off on installing software updates, remember why these updates are necessary in the first place
The post 5 reasons to keep your software and devices up to date appeared first on WeLiveSecurity
ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign
The post APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign
The post APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe appeared first on WeLiveSecurity
APT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app
The post Domestic Kitten campaign spying on Iranian citizens with new FurBall malware appeared first on WeLiveSecurity
With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force
The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity
What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay?
The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity
More than a dozen organizations operating in various verticals were attacked by the threat actor
The post ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe appeared first on WeLiveSecurity
More than a dozen organizations operating in various verticals were attacked by the threat actor
The post ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe appeared first on WeLiveSecurity
More than a dozen organizations operating in various verticals were attacked by the threat actor
The post ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe appeared first on WeLiveSecurity
From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell.
The post Life in pursuit of answers: In the words of Ada Yonath appeared first on WeLiveSecurity
From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell.
The post Life in pursuit of answers: In the words of Ada Yonath appeared first on WeLiveSecurity
Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep your money safe while using the popular P2P payment service.
The post How scammers target Zelle users – and how you can stay safe appeared first on WeLiveSecurity
ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group
The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity
Has your Steam account been hacked? Here are the signs to look for and what you can do to get your account back.
The post Steam account stolen? Here’s how to get it back appeared first on WeLiveSecurity
A look back on the key trends and developments that shaped the cyberthreat landscape from May to August of this year
The post Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits
The post The need to change cybersecurity for the next generation appeared first on WeLiveSecurity
A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity
As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?
The post 8 questions to ask yourself before getting a home security camera appeared first on WeLiveSecurity
The attack involved the first recorded abuse of a security vulnerability in a Dell driver that was patched in May 2021
The post ESET Research into new attacks by Lazarus – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The attack involved the first recorded abuse of a security vulnerability in a Dell driver that was patched in May 2021
The post ESET Research into new attacks by Lazarus – Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers
The post Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium appeared first on WeLiveSecurity
ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers
The post Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium appeared first on WeLiveSecurity
Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online
The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity
Had your Instagram account stolen? Don’t panic – here’s how to get your account back and how to avoid getting hacked (again)
The post What happens with a hacked Instagram account – and how to recover it appeared first on WeLiveSecurity
A major financial services company has learned the hard way about the importance of proper disposal of customers' personal data
The post What to consider before disposing of personal data – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits?
The post 5 tips to help children navigate the internet safely appeared first on WeLiveSecurity
Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?
The post Hey WeLiveSecurity, how does biometric authentication work? appeared first on WeLiveSecurity
Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device
The post Can your iPhone be hacked? What to know about iOS security appeared first on WeLiveSecurity
Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device
The post Can your iPhone be hacked? What to know about iOS security appeared first on WeLiveSecurity
The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products
The post Rising to the challenges of secure coding – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Cross-site tracking cookies have a bleak future but can still cause privacy woes to unwary users
The post Third‑party cookies: How they work and how to stop them from tracking you across the web appeared first on WeLiveSecurity
ESET Research first spotted this variant of the SideWalk backdoor in the network of a Hong Kong university in February 2021
The post SparklingGoblin deploys new Linux backdoor – Week in security, special edition appeared first on WeLiveSecurity
Cross-site tracking cookies have a bleak future but can still cause privacy woes to unwary users
The post Third‑party cookies: How they work and how to stop them from tracking you across the web appeared first on WeLiveSecurity
ESET Research first spotted this variant of the SideWalk backdoor in the network of a Hong Kong university in February 2021
The post SparklingGoblin deploys new Linux backdoor – Week in security, special edition appeared first on WeLiveSecurity
ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor
The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity
ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor
The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity
ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor
The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity
Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up.
The post Why is my Wi‑Fi slow and how do I make it faster? appeared first on WeLiveSecurity
Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up.
The post Why is my Wi‑Fi slow and how do I make it faster? appeared first on WeLiveSecurity
Worok takes aim at various high-profile organizations that operate in multiple sectors and are located primarily in Asia
The post ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Worok takes aim at various high-profile organizations that operate in multiple sectors and are located primarily in Asia
The post ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe appeared first on WeLiveSecurity
It pays to do some research before taking a leap into the world of internet-connected toys
The post Toys behaving badly: How parents can protect their family from IoT threats appeared first on WeLiveSecurity
Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol
The post RDP on the radar: An up‑close view of evolving remote access threats appeared first on WeLiveSecurity
Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files
The post Worok: The big picture appeared first on WeLiveSecurity
Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files
The post Worok: The big picture appeared first on WeLiveSecurity
What if your organization is hit by a cyberattack that is attributed to a nation state? Would your insurance cover the costs of the attack?
The post Will cyber‑insurance pay out? – Week in security with Tony Anscombe appeared first on WeLiveSecurity
What if your organization is hit by a cyberattack that is attributed to a nation state? Would your insurance cover the costs of the attack?
The post Will cyber‑insurance pay out? – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.
The post How to take control over your digital legacy appeared first on WeLiveSecurity
Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.
The post How to take control over your digital legacy appeared first on WeLiveSecurity
Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.
The post How to take control over your digital legacy appeared first on WeLiveSecurity
Are you aware of the perils of the world’s no. 1 social media? Do you know how to avoid scams and stay safe on TikTok?
The post TikShock: Don’t get caught out by these 5 TikTok scams appeared first on WeLiveSecurity
Are you aware of the perils of the world’s no. 1 social media? Do you know how to avoid scams and stay safe on TikTok?
The post TikShock: Don’t get caught out by these 5 TikTok scams appeared first on WeLiveSecurity
As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts
The post French hospital crippled by cyberattack – Week in security with Tony Anscombe appeared first on WeLiveSecurity
As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts
The post French hospital crippled by cyberattack – Week in security with Tony Anscombe appeared first on WeLiveSecurity
As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts
The post French hospital crippled by cyberattack – Week in security with Tony Anscombe appeared first on WeLiveSecurity
As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts
The post French hospital crippled by cyberattack – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you
The post What is doxing and how to protect yourself appeared first on WeLiveSecurity
Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you
The post What is doxing and how to protect yourself appeared first on WeLiveSecurity
Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you
The post What is doxing and how to protect yourself appeared first on WeLiveSecurity
Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you
The post What is doxing and how to protect yourself appeared first on WeLiveSecurity
You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps
The post Is your personal data all over the internet? 7 steps to cleaning up your online presence appeared first on WeLiveSecurity
Zero-day vulnerabilities are super active and Google and Apple are acting to patch these vulnerabilities, some of which seen on-the-wild.
The post Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Zero-day vulnerabilities are super active and Google and Apple are acting to patch these vulnerabilities, some of which seen on-the-wild.
The post Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Zero-day vulnerabilities are super active and Google and Apple are acting to patch these vulnerabilities, some of which seen on-the-wild.
The post Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony Anscombe appeared first on WeLiveSecurity
LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.
The post A step‑by‑step guide to enjoy LinkedIn safely appeared first on WeLiveSecurity
Don't worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference.
The post DEF CON – “don’t worry, the elections are safe” edition appeared first on WeLiveSecurity
Don't worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference.
The post DEF CON – “don’t worry, the elections are safe” edition appeared first on WeLiveSecurity
The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain
The post How a spoofed email passed the SPF check and landed in my inbox appeared first on WeLiveSecurity
The digital skills gap, especially in cybersecurity, is not a new phenomenon. This problematic is now exacerbate by the prevalence of burnout, which was presented at Black Hat USA 2022
The post Black Hat USA 2022: Burnout, a significant issue appeared first on WeLiveSecurity
Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars
The post Black Hat – Windows isn’t the only mass casualty platform anymore appeared first on WeLiveSecurity
The digital skills gap, especially in cybersecurity, is not a new phenomenon. This problematic is now exacerbate by the prevalence of burnout, which was presented at Black Hat USA 2022
The post Black Hat USA 2022: Burnout, a significant issue appeared first on WeLiveSecurity
Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars
The post Black Hat – Windows isn’t the only mass casualty platform anymore appeared first on WeLiveSecurity
The NHS was victim of a potential cyberattack, which raises the question of the impact of those data breach for the public.
The post The potential consequences of data breach, and romance scams – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The NHS was victim of a potential cyberattack, which raises the question of the impact of those data breach for the public.
The post The potential consequences of data breach, and romance scams – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.
The post Black Hat 2022‑ Cyberdefense in a global threats era appeared first on WeLiveSecurity
Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.
The post Safety first: how to tweak the settings on your dating apps appeared first on WeLiveSecurity
The NHS was victim of a potential cyberattack, which raises the question of the impact of those data breach for the public.
The post The potential consequences of data breach, and romance scams – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.
The post Black Hat 2022‑ Cyberdefense in a global threats era appeared first on WeLiveSecurity
Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.
The post Safety first: how to tweak the settings on your dating apps appeared first on WeLiveSecurity
A deep-dive in Zero-trust, to help you navigate in a zero-trust world and further secure your organization.
The post An eighties classic – Zero Trust appeared first on WeLiveSecurity
A deep-dive in Zero-trust, to help you navigate in a zero-trust world and further secure your organization.
The post An eighties classic – Zero Trust appeared first on WeLiveSecurity
Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.
The post How to check if your PC has been hacked, and what to do next appeared first on WeLiveSecurity
Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.
The post How to check if your PC has been hacked, and what to do next appeared first on WeLiveSecurity
Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.
The post How to check if your PC has been hacked, and what to do next appeared first on WeLiveSecurity
Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.
The post How to check if your PC has been hacked, and what to do next appeared first on WeLiveSecurity
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.
The post Develop a zero‑trust environment to protect your organization – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.
The post Don’t get singed by scammers while you’re carrying the torch for Tinder appeared first on WeLiveSecurity
Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.
The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.
The post Develop a zero‑trust environment to protect your organization – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.
The post Develop a zero‑trust environment to protect your organization – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.
The post Develop a zero‑trust environment to protect your organization – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.
The post Don’t get singed by scammers while you’re carrying the torch for Tinder appeared first on WeLiveSecurity
Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.
The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity
Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.
The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity
Cybercriminals exploited a vulnerability to steal the equivalent of 18M$ from the NFT music streaming platform Audius, while other cyberthreats related to crypto makes the news.
The post Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Cybercriminals exploited a vulnerability to steal the equivalent of 18M$ from the NFT music streaming platform Audius, while other cyberthreats related to crypto makes the news.
The post Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Cybercriminals exploited a vulnerability to steal the equivalent of 18M$ from the NFT music streaming platform Audius, while other cyberthreats related to crypto makes the news.
The post Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.
The post Staying safe online: How to browse the web securely appeared first on WeLiveSecurity
Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.
The post Staying safe online: How to browse the web securely appeared first on WeLiveSecurity
It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash
The post Cash App fraud: 10 common scams to watch out for appeared first on WeLiveSecurity
It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash
The post Cash App fraud: 10 common scams to watch out for appeared first on WeLiveSecurity
I’ve created an NFT so you don’t have to – here's the good, the bad and the intangible of the hot-ticket tokens
The post NFT: A new‑fangled trend or also a new‑found treasure? appeared first on WeLiveSecurity
I’ve created an NFT so you don’t have to – here's the good, the bad and the intangible of the hot-ticket tokens
The post NFT: A new‑fangled trend or also a new‑found treasure? appeared first on WeLiveSecurity
ESET research shows yet again that macOS is not immune to malware and why some users can benefit from Apple’s Lockdown Mode
The post macOS malware: myth vs. reality – Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET research shows yet again that macOS is not immune to malware – and why some users can benefit from Apple’s Lockdown Mode
The post macOS malware: myth vs. reality – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices
The post ESET Research Podcast: Hot security topics at RSA or mostly hype? appeared first on WeLiveSecurity
Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices
The post ESET Research Podcast: Hot security topics at RSA or mostly hype? appeared first on WeLiveSecurity
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
The post I see what you did there: A look at the CloudMensis macOS spyware appeared first on WeLiveSecurity
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
The post I see what you did there: A look at the CloudMensis macOS spyware appeared first on WeLiveSecurity
Why downloading pirated video games may ultimately cost you dearly and how to stay safe while gaming online
The post Think twice before downloading pirated games – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The heavyweights are now moving into API security, cementing it as “A Thing”
The post API security moves mainstream appeared first on WeLiveSecurity
In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers
The post Collaboration and knowledge sharing key to progress in cybersecurity appeared first on WeLiveSecurity
It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games
The post Play it safe: 5 reasons not to download pirated games appeared first on WeLiveSecurity
Vacations are a great time to unwind, but if you're not careful, you may face a digital disaster. Here's how to keep your devices and data secure while you're on the move
The post Avoid travel digital disasters – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Scammers don't take the summer off – be on your guard when buying your Crit'Air sticker
The post Driving to France this summer? Watch out for scam websites before you go appeared first on WeLiveSecurity
Here’s what to watch out for when buying or selling stuff on the online marketplace and how to tell if you’re being scammed
The post 8 common Facebook Marketplace scams and how to avoid them appeared first on WeLiveSecurity
One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?
The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity
As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you're dealing with a scam?
The post Watch out for survey scams – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The lead-up to the Canada Day festivities has brought a tax scam with it
The post Phishing scam poses as Canadian tax agency before Canada Day appeared first on WeLiveSecurity
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is
The post Costco 40th anniversary scam targets WhatsApp users appeared first on WeLiveSecurity
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
The post Do back offices mean backdoors? appeared first on WeLiveSecurity
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
The post Do back offices mean backdoors? appeared first on WeLiveSecurity
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe
The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity
As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?
The post Instagram’s new age verification tool – Week in security with Tony Anscombe appeared first on WeLiveSecurity
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity
As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
The post How to spot malicious spam – Week in security with Tony Anscombe appeared first on WeLiveSecurity
As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
The post How to spot malicious spam – Week in security with Tony Anscombe appeared first on WeLiveSecurity