Tag: welivesecurity

Sandworm: A tale of disruption told anew

This article has been indexed from WeLiveSecurity As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again The post Sandworm: A tale of disruption told anew appeared first on WeLiveSecurity Read the…

Defending the data center: The time to act is now

This article has been indexed from WeLiveSecurity Cyberattacks against data centers may ultimately be everyone’s problem – how prepared are their operators for the heightened risk of cyber-assaults? The post Defending the data center: The time to act is now…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET Research finds another data wiper in Ukraine – Securing data centers against threats – A cultural divide between the military and Silicon Valley The post Week in security with Tony Anscombe appeared…

US military vs. Silicon Valley – a cultural divide

This article has been indexed from WeLiveSecurity The US military knows it needs to speed up technology adoption through optimization, something at the heart of Silicon Valley culture The post US military vs. Silicon Valley – a cultural divide appeared…

CaddyWiper: New wiper malware discovered in Ukraine

This article has been indexed from WeLiveSecurity This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations The post CaddyWiper: New wiper malware discovered in Ukraine…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Gray zone conflicts in cyberspace – Can you identify fake news? – Top cybersecurity threats for the healthcare sector The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity New malware targeting organizations in Ukraine – How organizations can improve their cyber-resiliency – Scammers taking advantage of the crisis The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read…

Innovation and the Roots of Progress

This article has been indexed from WeLiveSecurity If you look back at the long arc of history, it’s clear that one of the most crucial drivers of real progress in society is innovation The post Innovation and the Roots of…

Beware of charity scams exploiting war in Ukraine

This article has been indexed from WeLiveSecurity Looking to help people in Ukraine? Donate wisely – do your research first so you give without getting scammed The post Beware of charity scams exploiting war in Ukraine appeared first on WeLiveSecurity…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity HermeticWiper takes aim at Ukraine – The climate solutions we need to transform society – Preventing kids from getting involved in cybercrime The post Week in security with Tony Anscombe appeared first on…

HermeticWiper: New data‑wiping malware hits Ukraine

This article has been indexed from WeLiveSecurity Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites The post HermeticWiper: New data‑wiping malware hits Ukraine appeared first on WeLiveSecurity…

Technology, Progress, and Climate

This article has been indexed from WeLiveSecurity The climate solutions we need to transform every sector are here. The question is: what role will you play in this transformation? You, your community, your business, your government? The post Technology, Progress,…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity What does progress in technology mean? – IRS makes a U-turn on facial recognition but questions remain – What retailers need to know about cyberthreats The post Week in security with Tony Anscombe…

Questions linger after IRS’s about‑face on facial recognition

This article has been indexed from WeLiveSecurity Why would a tax agency contractor’s privacy policy mention collecting information about my Facebook friends? The post Questions linger after IRS’s about‑face on facial recognition appeared first on WeLiveSecurity Read the original article:…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity New ESET Threat Report is out – How dark web services are moving to common apps and services – Leave romance scammers high and dry The post Week in security with Tony Anscombe…

ESET Threat Report T3 2021

This article has been indexed from WeLiveSecurity A view of the T3 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T3 2021 appeared first…

US: Your AI has to explain its decisions

This article has been indexed from WeLiveSecurity No more turning a blind eye to algorithmic bias and discrimination if US lawmakers get their way The post US: Your AI has to explain its decisions appeared first on WeLiveSecurity Read the…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity What to know before scanning a QR code – Has your phone been hacked? – Watch your back and keep shoulder surfers at bay The post Week in security with Tony Anscombe appeared…

How to tell if your phone has been hacked

This article has been indexed from WeLiveSecurity Think your smartphone has been compromised by malware? Here’s how to spot the signs of a hacked phone and how to remove the hacker from your phone. The post How to tell if…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET Research uncovers DazzleSpy malware attacks targeting macOS users – Trading personal data for free online services – PayPal hacking made easy The post Week in security with Tony Anscombe appeared first on…

Watering hole deploys new macOS malware, DazzleSpy, in Asia

This article has been indexed from WeLiveSecurity Hong Kong pro-democracy radio station website compromised to serve a Safari exploit that installed cyberespionage malware on site visitors’ Macs The post Watering hole deploys new macOS malware, DazzleSpy, in Asia appeared first…

How I hacked my friend’s PayPal account

This article has been indexed from WeLiveSecurity Somebody could easily take control of your PayPal account and steal money from you if you’re not careful – here’s how to stay safe from a simple but effective attack The post How…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET research into Donot Team attacks – Common signs that your email has been hacked – Social media dos and don’ts in the workplace The post Week in security with Tony Anscombe appeared…

How to know if your email has been hacked

This article has been indexed from WeLiveSecurity Think your email may have been hacked? Here are the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again The post…

DoNot Go! Do not respawn!

This article has been indexed from WeLiveSecurity ESET researchers take a deep look into recent attacks carried out by Donot Team throughout 2020 and 2021, targeting government and military entities in several South Asian countries The post DoNot Go! Do…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity How malware exploits security flaws in kernel drivers – Watch out for cryptocurrency scams – Why loyalty accounts are a target for criminals The post Week in security with Tony Anscombe appeared first…

Signed kernel drivers – Unguarded gateway to Windows’ core

This article has been indexed from WeLiveSecurity ESET researchers look at malware that abuses vulnerabilities in kernel drivers and outline mitigation techniques against this type of exploitation The post Signed kernel drivers – Unguarded gateway to Windows’ core appeared first…

CES 2022: Wireless power for all

This article has been indexed from WeLiveSecurity We don’t need no stinkin’ wall power as CES shows off the power and promise of usable long-range wireless charging The post CES 2022: Wireless power for all appeared first on WeLiveSecurity Read…

CES 2022: Space security – no more flying blind

This article has been indexed from WeLiveSecurity And no more worrying about your satellite being smashed by a “drunk driver” as new tech promises to predict hazards in orbit The post CES 2022: Space security – no more flying blind appeared…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity CES gives us a glimpse of our connected future – 10 bad cybersecurity habits to break this year – How hackers steal passwords The post Week in security with Tony Anscombe appeared first…

CES 2022: More sensors than people

This article has been indexed from WeLiveSecurity A sea of sensors will soon influence almost everything in your world The post CES 2022: More sensors than people appeared first on WeLiveSecurity Read the original article: CES 2022: More sensors than…

22 cybersecurity statistics to know for 2022

This article has been indexed from WeLiveSecurity As we usher in the New Year, let’s take a look at some statistics that will help you stay up-to-date on recent cybersecurity trends The post 22 cybersecurity statistics to know for 2022…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Why the vulnerability in Log4j poses a grave threat – What businesses should know about Log4Shell – ESET wraps up a series of deep-dives into Latin American banking trojans The post Week in…

The dirty dozen of Latin America: From Amavaldo to Zumanek

This article has been indexed from WeLiveSecurity The grand finale of our series dedicated to demystifying Latin American banking trojans The post The dirty dozen of Latin America: From Amavaldo to Zumanek appeared first on WeLiveSecurity Read the original article:…

What every business leader needs to know about Log4Shell

This article has been indexed from WeLiveSecurity Hundreds of thousands of attempts to exploit the vulnerability are under way The post What every business leader needs to know about Log4Shell appeared first on WeLiveSecurity Read the original article: What every…

5 warning signs your identity has been stolen

This article has been indexed from WeLiveSecurity By spotting these early warning signs of identity theft, you can minimize the impact on you and your family The post 5 warning signs your identity has been stolen appeared first on WeLiveSecurity…

Log4Shell vulnerability: What we know so far

This article has been indexed from WeLiveSecurity The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far The post Log4Shell vulnerability: What we know so far appeared…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity How ‘shoulder surfers’ could hack into your Snapchat – Staying safe from gift card fraud – What is a buffer overflow vulnerability? The post Week in security with Tony Anscombe appeared first on…

5 common gift card scams and how to spot them

This article has been indexed from WeLiveSecurity It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET researchers analyze malware frameworks targeting air-gapped networks – ESET Research launches a podcast – INTERPOL cracks down on online fraud The post Week in security with Tony Anscombe appeared first on WeLiveSecurity…

Jumping the air gap: 15 years of nation‑state effort

This article has been indexed from WeLiveSecurity ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs The post Jumping the…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice The post Week in security with…

What to do if you receive a data breach notice

This article has been indexed from WeLiveSecurity Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed The post What to…

CYBERWARCON – Foreign influence operations grow up

This article has been indexed from WeLiveSecurity Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks. The post CYBERWARCON – Foreign influence operations grow up appeared first…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET discovers watering hole attacks in the Middle East – Getting your life back on track after identity theft – How foreign influence operations have evolved The post Week in security with Tony…

FBI systems compromised to send out fake attack alerts

This article has been indexed from WeLiveSecurity Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks The post FBI systems compromised to send out fake attack alerts appeared first on…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity Steps to take right after a data breach – What to consider before going passwordless – 7 million people hit by Robinhood data breach The post Week in security with Tony Anscombe appeared…

Robinhood data breach affects 7 million people

This article has been indexed from WeLiveSecurity An attacker gained access to some of Robinhood’s customer support systems and stole the personal data of around a third of the app’s userbase The post Robinhood data breach affects 7 million people…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity What’s it like working as a malware researcher? – ProtonMail and the battle for email privacy – Man charged with hacking, trying to extort US sports leagues The post Week in security with…

Week in security with Tony Anscombe

This article has been indexed from WeLiveSecurity ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read…

5 tips for parents for a cybersecure Halloween

This article has been indexed from WeLiveSecurity What are some of the key dangers faced by children online and how can you help protect them from the ghosts, ghouls and goblins creeping on the internet? The post 5 tips for…