Don’t be the next victim – here’s what to know about some of the most common tricks that scammers use on the payment app The post Top 10 Venmo scams – and how to stay safe appeared first on WeLiveSecurity…
Tag: welivesecurity
Hybrid commerce: Blurring the lines between business and pleasure
It is now acceptable to find a job on a dating app! The post Hybrid commerce: Blurring the lines between business and pleasure appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Hybrid commerce:…
APT group trojanizes Telegram app – Week in security with Tony Anscombe
StrongPity’s backdoor is fitted with various spying features and can record phone calls, collect texts, and gather call logs and contact lists The post APT group trojanizes Telegram app – Week in security with Tony Anscombe appeared first on WeLiveSecurity…
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit
ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA The post Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Now you can legally repair your tech – sort of
A new law portends a future where (we hope) it will be easier for us all to repair, fix, upgrade, and just tinker with things we already own The post Now you can legally repair your tech – sort of…
StrongPity espionage campaign targeting Android users
ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version The post StrongPity espionage campaign targeting Android users appeared first…
Hybrid work: Turning business platforms into preferred social spaces
Hybrid work and hybrid play now merge into hybrid living, but where is the line between the two? Is there one? The post Hybrid work: Turning business platforms into preferred social spaces appeared first on WeLiveSecurity This article has been…
Cracked it! Highlights from KringleCon 5: Golden Rings
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum’s foul plan and recover the five golden rings The post Cracked it! Highlights from…
Ransomware target list – Week in security with Tony Anscombe
Why schools, hospitals, local governments and other public sector organizations are in a sweet spot for ransomware attacks The post Ransomware target list – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed from…
The doctor will see you now … virtually: Tips for a safe telehealth visit
Are your virtual doctor visits private and secure? Here’s what to know about, and how to prepare for, connecting with a doctor from the comfort of your home. The post The doctor will see you now … virtually: Tips for…
Gaming: How much is too much for our children?
With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity This…
The world’s most common passwords: What to do if yours is on the list
Do you use any of these extremely popular – and eminently hackable – passwords? If so, we have a New Year’s resolution for you. The post The world’s most common passwords: What to do if yours is on the list…
Cybersecurity trends and challenges to look out for in 2023
What are some of the key cybersecurity trends and themes that organizations should have on their radars in 2023? The post Cybersecurity trends and challenges to look out for in 2023 appeared first on WeLiveSecurity This article has been indexed…
2022 in review: 10 of the year’s biggest cyberattacks
The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022 The post 2022 in review: 10…
‘Tis the season for gaming: Keeping children safe (and parents sane)
It’s all fun and games over the holidays, but is your young gamer safe from the darker side of the action? The post ‘Tis the season for gaming: Keeping children safe (and parents sane) appeared first on WeLiveSecurity This article…
How to set up parental controls on your child’s new smartphone
Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls The post How to set up parental controls on your child’s new smartphone appeared first on WeLiveSecurity This article…
MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe
The group’s proprietary backdoor LODEINFO delivers additional malware, exfiltrates credentials, and steals documents and emails The post MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed…
Help! My kid has asked Santa for a smartphone
The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them use their new gadget safely and responsibly. The post Help! My kid has asked Santa for a smartphone…
Traveling for the holidays? Stay cyber‑safe with these tips
Holiday travel is back with a vengeance this year. Set yourself up for a cyber-safe and hassle-free trip with our checklist. The post Traveling for the holidays? Stay cyber‑safe with these tips appeared first on WeLiveSecurity This article has been…
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities
ESET researchers discovered a spearphishing campaign targeting Japanese political entities a few weeks before the House of Councillors elections, and in the process uncovered a previously undescribed MirrorFace credential stealer The post Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities…
Top tips for security‑ and privacy‑enhancing holiday gifts
Think outside the (gift) box. Here are a few ideas for security and privacy gifts to get for your relatives – or even for yourself. Some don’t cost a penny! The post Top tips for security‑ and privacy‑enhancing holiday gifts…
Cybersecurity Trends 2023: Securing our hybrid lives
ESET experts offer their reflections on what the continued blurring of boundaries between different spheres of life means for our human and social experience – and especially our cybersecurity and privacy The post Cybersecurity Trends 2023: Securing our hybrid lives…
Xenomorph: What to know about this Android banking trojan
Xenomorph pilfers victims’ login credentials for banking, payment, social media, cryptocurrency and other apps with valuable data The post Xenomorph: What to know about this Android banking trojan appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read…
Diamond industry under attack – Week in security with Tony Anscombe
ESET researchers uncover a new wiper and its execution tool, both attributed to the Iran-aligned Agrius APT group The post Diamond industry under attack – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed…
Fantasy – a new Agrius wiper deployed through a supply‑chain attack
ESET researchers analyzed a supply-chain attack abusing an Israeli software developer to deploy Fantasy, Agrius’s new wiper, with victims including the diamond industry The post Fantasy – a new Agrius wiper deployed through a supply‑chain attack appeared first on WeLiveSecurity…
Tractors vs. threat actors: How to hack a farm
Forget pests for a minute. Modern farms also face another – and more insidious – breed of threat. The post Tractors vs. threat actors: How to hack a farm appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity…
Top tips to save energy used by your electronic devices
With the rapidly rising energy prices putting a strain on many households, what are some quick wins to help reduce the power consumption of your gadgets? The post Top tips to save energy used by your electronic devices appeared first…
Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin
ESET researchers uncover Dolphin, a sophisticated backdoor extending the arsenal of the ScarCruft APT group The post Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
RansomBoggs: New ransomware targeting Ukraine
ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm’s fingerprints all over it The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Know your payment options: How to shop and pay safely this holiday season
‘Tis the season for shopping and if you too are scouting for bargains, make sure to keep your money safe when snapping up those deals The post Know your payment options: How to shop and pay safely this holiday season…
Spyware posing as VPN apps – Week in security with Tony Anscombe
The Bahamut APT group distributes at least eight malicious apps that pilfer victims’ data and monitor their messages and conversations The post Spyware posing as VPN apps – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article…
10 tips to avoid Black Friday and Cyber Monday scams
It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams doing the rounds this holiday shopping season The post 10 tips to avoid Black Friday and Cyber Monday…
Bahamut cybermercenary group targets Android users with fake VPN apps
Malicious apps used in this active campaign exfiltrate contacts, SMS messages, recorded phone calls, and even chat messages from apps such as Signal, Viber, and Telegram The post Bahamut cybermercenary group targets Android users with fake VPN apps appeared first…
Security fatigue is real: Here’s how to overcome it
Do your employees take more risks with valuable data because they’ve become desensitized to security guidance? Spot the symptoms before it’s too late. The post Security fatigue is real: Here’s how to overcome it appeared first on WeLiveSecurity This article…
Tor vs. VPN: Which should you choose?
Both Tor and a VPN can greatly help you keep prying eyes away from your online life, but they’re also two very different beasts. Which suits your needs better? The post Tor vs. VPN: Which should you choose? appeared first…
Latest insights on APT activity – Week in security with Tony Anscombe
What have some of the world’s most notorious APT groups been up to lately? A new ESET report released this week has the answers. The post Latest insights on APT activity – Week in security with Tony Anscombe appeared first…
Open banking: Tell me what you buy, and I’ll tell you who you are
The convenience with which you manage all your financial wants and needs may come at a cost The post Open banking: Tell me what you buy, and I’ll tell you who you are appeared first on WeLiveSecurity This article has…
Open banking: Tell me what you buy, and I’ll tell you who you are
The convenience with which you manage all your financial wants and needs may come at a cost The post Open banking: Tell me what you buy, and I’ll tell you who you are appeared first on WeLiveSecurity This article has…
ESET APT Activity Report T2 2022
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022 The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
FIFA World Cup 2022 scams: Beware of fake lotteries, ticket fraud and other cons
When in doubt, kick it out, plus other tips for hardening your cyber-defenses against World Cup-themed phishing and other scams The post FIFA World Cup 2022 scams: Beware of fake lotteries, ticket fraud and other cons appeared first on WeLiveSecurity…
Security challenges facing SMBs – Week in security with Tony Anscombe
New ESET report shows how ever-growing threats impact SMB sentiment and why many SMBs are underprepared to defend against attacks The post Security challenges facing SMBs – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has…
Toward the cutting edge: SMBs contemplating enterprise security
Survey finds SMBs, weary of security failures, curious about detection and response The post Toward the cutting edge: SMBs contemplating enterprise security appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Toward the cutting…
10 common security mistakes and how to avoid them
Do you make these security mistakes and put yourself at greater risk for successful attacks? The post 10 common security mistakes and how to avoid them appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Hacking baby monitors can be child’s play: Here’s how to stay safe
Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk The post Hacking baby monitors can be child’s play: Here’s how to stay safe appeared first on…
Ransomware rages on – Week in security with Tony Anscombe
This week’s news offered fresh reminders of the threat that ransomware poses for businesses and critical infrastructure worldwide The post Ransomware rages on – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed from…
The future starts now: 10 major challenges facing cybersecurity
To mark Antimalware Day, we’ve rounded up some of the most pressing issues for cybersecurity now and in the future The post The future starts now: 10 major challenges facing cybersecurity appeared first on WeLiveSecurity This article has been indexed from…
The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs
Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras and put your worries to rest. The post The spy who rented to me? Throwing the spotlight on hidden cameras in…
Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween
Gather around, folks, to learn about some of the ghastliest tricks used by criminals online and how you can avoid security horrors this Halloween and beyond The post Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween…
Courts vs. cybercrime – Week in security with Tony Anscombe
A look at a recent string of law enforcement actions directed against (in some cases suspected) perpetrators of various types of cybercrime The post Courts vs. cybercrime – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article…
Why your phone is slow – and how to speed it up
You probably don’t have to ditch your phone just yet – try these simple tips and tricks to make any Android device or iPhone run faster The post Why your phone is slow – and how to speed it up…
Parcel delivery scams are on the rise: Do you know what to watch out for?
As package delivery scams that spoof DHL, USPS and other delivery companies soar, here’s how to stay safe not just this shopping season The post Parcel delivery scams are on the rise: Do you know what to watch out for?…
5 reasons to keep your software and devices up to date
Next time you’re tempted to hold off on installing software updates, remember why these updates are necessary in the first place The post 5 reasons to keep your software and devices up to date appeared first on WeLiveSecurity This article…
Parcel delivery scams are on the rise: Do you know what to watch out for?
As package delivery scams that spoof DHL, USPS and other delivery companies soar, here’s how to stay safe not just this shopping season The post Parcel delivery scams are on the rise: Do you know what to watch out for?…
5 reasons to keep your software and devices up to date
Next time you’re tempted to hold off on installing software updates, remember why these updates are necessary in the first place The post 5 reasons to keep your software and devices up to date appeared first on WeLiveSecurity This article…
Don’t get scammed when buying tickets online
With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read…
APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe
ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign The post APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe appeared first on WeLiveSecurity…
Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
APT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app The post Domestic Kitten campaign spying on Iranian citizens with new FurBall malware appeared first on WeLiveSecurity This…
Don’t get scammed when buying tickets online
With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read…
Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
APT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app The post Domestic Kitten campaign spying on Iranian citizens with new FurBall malware appeared first on WeLiveSecurity This…
Don’t get scammed when buying tickets online
With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read…
5 steps to protect your school from cyberattacks
What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay? The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity This article has been…
5 steps to protect your school from cyberattacks
What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay? The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity This article has been…
ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe
More than a dozen organizations operating in various verticals were attacked by the threat actor The post ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity…
Life in pursuit of answers: In the words of Ada Yonath
From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell. The post Life in pursuit of answers: In the words of Ada Yonath appeared first…
How scammers target Zelle users – and how you can stay safe
Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep your money safe while using the popular P2P payment service. The post How scammers target Zelle users – and how you can stay…
A life in pursuit of answers: In the words of Ada Yonath
From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell. The post A life in pursuit of answers: In the words of Ada Yonath appeared…
POLONIUM targets Israel with Creepy malware
ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Life in pursuit of answers: In the words of Ada Yonath
From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell. The post Life in pursuit of answers: In the words of Ada Yonath appeared first…
How scammers target Zelle users – and how you can stay safe
Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep your money safe while using the popular P2P payment service. The post How scammers target Zelle users – and how you can stay…
POLONIUM targets Israel with Creepy malware
ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Steam account stolen? Here’s how to get it back
Has your Steam account been hacked? Here are the signs to look for and what you can do to get your account back. The post Steam account stolen? Here’s how to get it back appeared first on WeLiveSecurity This article…
Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe
A look back on the key trends and developments that shaped the cyberthreat landscape from May to August of this year The post Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe appeared first…
ESET Threat Report T2 2022
A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity This article has been indexed…
The need to change cybersecurity for the next generation
Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits The post The need to change cybersecurity for the next generation appeared first on WeLiveSecurity This article has…
ESET Threat Report T2 2022
A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity This article has been indexed…
8 questions to ask yourself before getting a home security camera
As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home? The post 8 questions to ask yourself before getting a home…
ESET Research into new attacks by Lazarus – Week in security with Tony Anscombe
The attack involved the first recorded abuse of a security vulnerability in a Dell driver that was patched in May 2021 The post ESET Research into new attacks by Lazarus – Week in security with Tony Anscombe appeared first on…
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium
ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers The post Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium appeared first on WeLiveSecurity This article has…
Protecting teens from sextortion: What parents should know
Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity This article has been…
Protecting teens from sextortion: What parents should know
Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity This article has been…
What happens with a hacked Instagram account – and how to recover it
Had your Instagram account stolen? Don’t panic – here’s how to get your account back and how to avoid getting hacked (again) The post What happens with a hacked Instagram account – and how to recover it appeared first on…
What happens with a hacked Instagram account – and how to recover it
Had your Instagram account stolen? Don’t panic – here’s how to get your account back and avoid getting hacked (again) The post What happens with a hacked Instagram account – and how to recover it appeared first on WeLiveSecurity This…
What to consider before disposing of personal data – Week in security with Tony Anscombe
A major financial services company has learned the hard way about the importance of proper disposal of customers’ personal data The post What to consider before disposing of personal data – Week in security with Tony Anscombe appeared first on…
Hey WeLiveSecurity, how does biometric authentication work?
Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication? The post Hey WeLiveSecurity,…
5 tips to help children navigate the internet safely
The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits? The post 5 tips to help children…
Hey WeLiveSecurity, how does biometric authentication work?
Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication? The post Hey WeLiveSecurity,…
Can your iPhone be hacked? What to know about iOS security
Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device The post Can your iPhone be hacked? What…
Can your iPhone be hacked? What to know about iOS security
Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device The post Can your iPhone be hacked? What…
Rising to the challenges of secure coding – Week in security with Tony Anscombe
The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products The post Rising to the challenges of secure coding – Week in security with Tony Anscombe appeared first on…
SparklingGoblin deploys new Linux backdoor – Week in security, special edition
ESET Research first spotted this variant of the SideWalk backdoor in the network of a Hong Kong university in February 2021 The post SparklingGoblin deploys new Linux backdoor – Week in security, special edition appeared first on WeLiveSecurity This article…
Third‑party cookies: How they work and how to stop them from tracking you across the web
Cross-site tracking cookies have a bleak future but can still cause privacy woes to unwary users The post Third‑party cookies: How they work and how to stop them from tracking you across the web appeared first on WeLiveSecurity This article…
You never walk alone: The SideWalk backdoor gets a Linux variant
ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity…
Why is my Wi‑Fi slow and how do I make it faster?
Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up. The post Why is my Wi‑Fi slow and how do I make it faster?…
ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe
Worok takes aim at various high-profile organizations that operate in multiple sectors and are located primarily in Asia The post ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article…
Toys behaving badly: How parents can protect their family from IoT threats
It pays to do some research before taking a leap into the world of internet-connected toys The post Toys behaving badly: How parents can protect their family from IoT threats appeared first on WeLiveSecurity This article has been indexed from…
RDP on the radar: An up‑close view of evolving remote access threats
Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol The post RDP on the radar: An up‑close view of evolving…
Worok: The big picture
Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files The post Worok: The big picture appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article:…
Will cyber‑insurance pay out? – Week in security with Tony Anscombe
What if your organization is hit by a cyberattack that is attributed to a nation state? Would your insurance cover the costs of the attack? The post Will cyber‑insurance pay out? – Week in security with Tony Anscombe appeared first…
How to take control over your digital legacy
Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services. The post How to take…
TikShock: Don’t get caught out by these 5 TikTok scams
Are you aware of the perils of the world’s no. 1 social media? Do you know how to avoid scams and stay safe on TikTok? The post TikShock: Don’t get caught out by these 5 TikTok scams appeared first on…