Tag: welivesecurity

How to share sensitive files securely online

Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe This article has been indexed from WeLiveSecurity Read the original article: How to share sensitive files…

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk This article has been indexed from WeLiveSecurity Read the original article: Vulnerabilities in business…

All eyes on AI | Unlocked 403: A cybersecurity podcast

Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack the basics and examine AI’s broader implications. This article has been indexed from WeLiveSecurity Read the original…

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: ChatGPT, the MOVEit…

Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management This article has been indexed from WeLiveSecurity Read the original article: Assessing and mitigating supply chain…

Black Hat Europe 2023: Should we regulate AI?

ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate IoT in the past? This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2023: Should we regulate AI?

To tap or not to tap: Are NFC payments safer?

Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods? This article has been indexed from WeLiveSecurity Read the original article: To tap or not to tap: Are NFC payments safer?

Very precisely lost – GPS jamming

The technology is both widely available and well developed, hence it’s also poised to proliferate – especially in the hands of those wishing ill This article has been indexed from WeLiveSecurity Read the original article: Very precisely lost – GPS…

Your voice is my password

AI-driven voice cloning can make things far too easy for scammers – I know because I’ve tested it so that you don’t have to learn about the risks the hard way. This article has been indexed from WeLiveSecurity Read the…

Fuel for thought: Can a driverless car get arrested?

What happens when problems caused by autonomous vehicles are not the result of errors, but the result of purposeful attacks? This article has been indexed from WeLiveSecurity Read the original article: Fuel for thought: Can a driverless car get arrested?

ESET APT Activity Report Q2–Q3 2023

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2–Q3 2023

Read it right! How to spot scams on Reddit

Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as “the front page of the Internet”? This article has been indexed from WeLiveSecurity Read the original…

Staying ahead of threats: 5 cybercrime trends to watch

New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought This article has been indexed from WeLiveSecurity Read the original article: Staying ahead of threats: 5 cybercrime…

Scarabs colon-izing vulnerable servers

Analysis of Spacecolon, a toolset used to deploy Scarab ransomware on vulnerable servers, and its operators, CosmicBeetle This article has been indexed from WeLiveSecurity Read the original article: Scarabs colon-izing vulnerable servers

ChatGPT, will you be my Valentine?

Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot that the world has fallen in love with so badly. The post ChatGPT, will you be my Valentine? appeared…

Confident cybersecurity means fewer headaches for SMBs

Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts The post Confident cybersecurity means fewer headaches for SMBs appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the…

Alexa, who else is listening?

Your smart speaker is designed to listen, but could it be eavesdropping too? The post Alexa, who else is listening? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Alexa, who else is listening?

ESET Threat Report T3 2022

A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T3 2022 appeared first on WeLiveSecurity This article has been indexed…

Into the void: Your tech and security in digital darkness

No internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications of being plunged into digital darkness. The post Into the void: Your tech and security in digital darkness appeared first on WeLiveSecurity This article…

ESET APT Activity Report T3 2022

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post ESET APT Activity Report T3 2022 appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…

SwiftSlicer: New destructive wiper malware strikes Ukraine

Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country The post SwiftSlicer: New destructive wiper malware strikes Ukraine appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: SwiftSlicer: New destructive…

Mastodon vs. Twitter: Know the differences

Looking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare to each other. The post Mastodon vs. Twitter: Know the differences appeared first on WeLiveSecurity This article has been…

Top 10 Venmo scams – and how to stay safe

Don’t be the next victim – here’s what to know about some of the most common tricks that scammers use on the payment app The post Top 10 Venmo scams – and how to stay safe appeared first on WeLiveSecurity…

StrongPity espionage campaign targeting Android users

ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version The post StrongPity espionage campaign targeting Android users appeared first…

Gaming: How much is too much for our children?

With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity This…