Tag: welivesecurity

Gaming company Capcom hit by cyberattack

Read the original article: Gaming company Capcom hit by cyberattack The developer of popular video game franchises took swift action to prevent the attack from spreading further across its systems The post Gaming company Capcom hit by cyberattack appeared first…

A career in cybersecurity: Is it for you?

Read the original article: A career in cybersecurity: Is it for you? There’s no shortage of opportunities for cybersecurity professionals and people looking to break into this field of endeavor. Could this also be the right career path for you?…

5 scary data breaches that shook the world

Read the original article: 5 scary data breaches that shook the world Just in time for Halloween, we look at the haunting reality of data breaches and highlight five tales that spooked not only the cyber-world The post 5 scary…

Election (in)security: What you may have missed

Read the original article: Election (in)security: What you may have missed As Election Day draws near, here’s a snapshot of how this election cycle is faring in the hands of the would-be digitally meddlesome The post Election (in)security: What you…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe New ESET Threat Report is out – Are things in IoT security finally changing? – 5 spooky tales of data breaches The post Week in security with Tony Anscombe appeared…

IoT security: Are we finally turning the corner?

Read the original article: IoT security: Are we finally turning the corner? Better IoT security and data protection are long overdue. Will they go from an afterthought to everyone’s priority any time soon? The post IoT security: Are we finally…

ESET Threat Report Q3 2020

Read the original article: ESET Threat Report Q3 2020 A view of the Q3 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report Q3 2020…

‘Among Us’ players hit by major spam attack

Read the original article: ‘Among Us’ players hit by major spam attack In-game chats were flooded with messages from somebody who tried to coerce players into subscribing to a dubious YouTube channel The post ‘Among Us’ players hit by major…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Security challenges for connected medical devices – Zero-day in Chrome gets patched – How to avoid USB drive security woes The post Week in security with Tony Anscombe appeared first…

Fraudsters crave loyalty points amid COVID‑19

Read the original article: Fraudsters crave loyalty points amid COVID‑19 Scammers even run their own dark-web “travel agencies”, misusing stolen loyalty points and credit card numbers The post Fraudsters crave loyalty points amid COVID‑19 appeared first on WeLiveSecurity   Become…

Google patches Chrome zero‑day under attack

Read the original article: Google patches Chrome zero‑day under attack In addition to patching the actively exploited bug, the update also brings fixes for another four security loopholes The post Google patches Chrome zero‑day under attack appeared first on WeLiveSecurity…

How safe is your USB drive?

Read the original article: How safe is your USB drive? What are some of the key security risks to be aware of when using USB flash drives and how can you mitigate the threats? The post How safe is your…

Microsoft issues two emergency Windows patches

Read the original article: Microsoft issues two emergency Windows patches The flaws, neither of which is being actively exploited, were fixed merely days after the monthly Patch Tuesday rollout The post Microsoft issues two emergency Windows patches appeared first on…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe ESET joins global effort to disrupt the infamous Trickbot botnet – Criminals claim to have hijacked thousands of security cameras – Five ways to secure your home office The post…

Zoom to begin rolling out end‑to‑end encryption

Read the original article: Zoom to begin rolling out end‑to‑end encryption The videoconferencing platform is making the feature available to users of both free and paid tiers The post Zoom to begin rolling out end‑to‑end encryption appeared first on WeLiveSecurity…

50,000 home cameras reportedly hacked, footage posted online

Read the original article: 50,000 home cameras reportedly hacked, footage posted online Some footage has already appeared on adult sites, with cybercriminals offering lifetime access to the entire loot for US$150 The post 50,000 home cameras reportedly hacked, footage posted…

ESET takes part in global operation to disrupt Trickbot

Read the original article: ESET takes part in global operation to disrupt Trickbot Throughout its monitoring, ESET analyzed thousands of malicious samples every month to help this effort The post ESET takes part in global operation to disrupt Trickbot appeared…

55 security flaws found in various Apple services

Read the original article: 55 security flaws found in various Apple services Five ethical hackers have earned almost US$300,000 in bug bounty rewards – so far The post 55 security flaws found in various Apple services appeared first on WeLiveSecurity…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Why deleting your personal data from social media may be impossible – How do you reset your face after a data breach? – The perils of working from a hotel…

Had your face stolen lately?

Read the original article: Had your face stolen lately? It’s easy to reset your password or PIN after a data breach. But reset your face? Not so much. The post Had your face stolen lately? appeared first on WeLiveSecurity  …

US gov’t warns against paying off ransomware attackers

Read the original article: US gov’t warns against paying off ransomware attackers Companies facilitating ransomware payments run the risk of facing stern penalties for violating US regulations The post US gov’t warns against paying off ransomware attackers appeared first on…

5 steps to secure your connected devices

Read the original article: 5 steps to secure your connected devices As we steadily adopt smart devices into our lives, we shouldn’t forget about keeping them secured and our data protected The post 5 steps to secure your connected devices…

5 tips for better Google Drive security

Read the original article: 5 tips for better Google Drive security As cloud storage solutions are becoming more and more popular, we look at several simple steps you can take to secure your files on Google Drive The post 5…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Bug let hijack Firefox browsers on other phones over Wi-Fi – NIST’s new tool to help firms understand why staff fall for phishing – Almost 200 arrested in dark web…

179 arrested in massive dark web bust

Read the original article: 179 arrested in massive dark web bust The sting is said to be the US Government’s largest operation targeting crime in the internet’s seedy underbelly The post 179 arrested in massive dark web bust appeared first…

5 ways cybercriminals can try to extort you

Read the original article: 5 ways cybercriminals can try to extort you What are some common strategies cybercriminals employ in extortion schemes and how can you mitigate the chances of falling victim to a cyber-shakedown? The post 5 ways cybercriminals…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Zoom now supports two-factor authentication. A cyber attack, which affected 14 inboxes belonging to Quebec’s Department of Justice, was confirmed by ESET researchers. The post Week in security with Tony…

Emotet strikes Quebec’s Department of Justice: An ESET Analysis

Read the original article: Emotet strikes Quebec’s Department of Justice: An ESET Analysis The cyber attack affects 14 inboxes belonging to the Department of Justice was confirmed by ESET researchers.  The post Emotet strikes Quebec’s Department of Justice: An ESET Analysis appeared first on WeLiveSecurity  …

Zoom makes 2FA available for all its users

Read the original article: Zoom makes 2FA available for all its users Zoom now supports phone calls, text messages and authentication apps as forms of two-factor authentication   The post Zoom makes 2FA available for all its users appeared first on…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe ESET researchers have discovered and analyzed CDRThief, a malware that targets Voice over IP (VoIP) softswitches. Righard Zwienenberg deep in the lead-offering business and invites us to take steps to…

Who is calling? CDRThief targets Linux VoIP softswitches

Read the original article: Who is calling? CDRThief targets Linux VoIP softswitches ESET researchers have discovered and analyzed malware that targets Voice over IP (VoIP) softswitches. The post Who is calling? CDRThief targets Linux VoIP softswitches appeared first on WeLiveSecurity…

Lead‑offering business booming as usual!

Read the original article: Lead‑offering business booming as usual! …but there are no conferences or exhibitions??? The post Lead‑offering business booming as usual! appeared first on WeLiveSecurity   Advertise on IT Security News. Read the original article: Lead‑offering business booming…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe ESET research dissects KryptoCibule malware family – Why close unused accounts rather than just remove apps – Microsoft’s new deepfake detector The post Week in security with Tony Anscombe appeared…

Houseparty – should I stay or should I go now?

Read the original article: Houseparty – should I stay or should I go now? What’s the benefit of deleting your Houseparty – or any other unused – account, rather than just uninstalling the app? The post Houseparty – should I…

Microsoft debuts deepfake detection tool

Read the original article: Microsoft debuts deepfake detection tool As the US presidential election nears, the company’s new tech should also help assure people that an image or video is authentic The post Microsoft debuts deepfake detection tool appeared first…

KryptoCibule: The multitasking multicurrency cryptostealer

Read the original article: KryptoCibule: The multitasking multicurrency cryptostealer ESET researchers analyze a previously undocumented trojan that is spread via malicious torrents and uses multiple tricks to squeeze as many cryptocoins as possible from its victims while staying under the…

Norway’s parliament struck by hackers

Read the original article: Norway’s parliament struck by hackers Unknown threat actors were able to exfiltrate information from the email accounts of several parliamentarians The post Norway’s parliament struck by hackers appeared first on WeLiveSecurity   Advertise on IT Security…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Canada’s government services hit by cyberattacks – Vishing attacks surge amid COVID-19 pandemic – DDoS extortionists strike again The post Week in security with Tony Anscombe appeared first on WeLiveSecurity…

DDoS extortion campaign targets financial firms, retailers

Read the original article: DDoS extortion campaign targets financial firms, retailers The extortionists attempt to scare the targets into paying by claiming to represent some of the world’s most notorious APT groups The post DDoS extortion campaign targets financial firms,…

FBI, CISA warn of spike in vishing attacks

Read the original article: FBI, CISA warn of spike in vishing attacks Cybercriminals increasingly take aim at teleworkers, setting up malicious duplicates of companies’ internal VPN login pages The post FBI, CISA warn of spike in vishing attacks appeared first…

How to secure your TikTok account

Read the original article: How to secure your TikTok account From keeping your account safe to curating who can view your liked content, we look at how you can increase your security and privacy on TikTok The post How to…

Cyber attacks: Several Canadian government services disrupted

Read the original article: Cyber attacks: Several Canadian government services disrupted Several services from the Canadian government, including the national revenue agency, had to be shut down following a series of credential stuffing cyberattacks. The post Cyber attacks: Several Canadian…

Grandoreiro banking trojan impersonates Spain’s tax agency

Read the original article: Grandoreiro banking trojan impersonates Spain’s tax agency Beware the tax bogeyman – there are tax scams aplenty The post Grandoreiro banking trojan impersonates Spain’s tax agency appeared first on WeLiveSecurity   Advertise on IT Security News.…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe This week, ESET researchers analyze fraud emails from the infamous Grandoreiro banking Trojan, impersonating the Agencia Tributaria, Spain’s tax agency. Our security expert Jake Moore demonstrates how easily it is to…

How to prepare and protect your digital legacy

Read the original article: How to prepare and protect your digital legacy It’s never too soon to plan for what will happen to your digital presence after you pass away The post How to prepare and protect your digital legacy…

Ritz London clients scammed after apparent data breach

Read the original article: Ritz London clients scammed after apparent data breach Armed with personal data stolen from the hotel’s dining reservation system, fraudsters trick guests into handing over their credit card details The post Ritz London clients scammed after…

Attack of the Instagram clones

Read the original article: Attack of the Instagram clones Could your social media account be spoofed, why would anybody do it, and what can you do to avoid having a doppelgänger? The post Attack of the Instagram clones appeared first…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe A deep dive into Mekotio – The financial fallout from data breaches – Fixing election security issues The post Week in security with Tony Anscombe appeared first on WeLiveSecurity  …

What is the cost of a data breach?

Read the original article: What is the cost of a data breach? The price tag is higher if the incident exposed customer data or if it was the result of a malicious attack, an annual IBM study finds The post…

Twitter working to fix issue with 2FA feature

Read the original article: Twitter working to fix issue with 2FA feature An apparent glitch is preventing a number of users from signing into their accounts The post Twitter working to fix issue with 2FA feature appeared first on WeLiveSecurity…

Black Hat 2020: Fixing voting – boiling the ocean?

Read the original article: Black Hat 2020: Fixing voting – boiling the ocean? With the big voting day rapidly approaching, can the security of the election still be shored up? If so, how? The post Black Hat 2020: Fixing voting – boiling…

Stadeo: Deobfuscating Stantinko and more

Read the original article: Stadeo: Deobfuscating Stantinko and more We introduce Stadeo – a set of scripts that can help fellow threat researchers and reverse engineers to deobfuscate the code of Stantinko and other malware The post Stadeo: Deobfuscating Stantinko…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe ESET highlights new research at Black Hat 2020 – What to if your data was stolen in the Blackbaud breach The post Week in security with Tony Anscombe appeared first…

Blackbaud data breach: What you should know

Read the original article: Blackbaud data breach: What you should know Here’s what to be aware of if your personal data was compromised in the breach at the cloud software provider The post Blackbaud data breach: What you should know appeared first…

FBI warns of surge in online shopping scams

Read the original article: FBI warns of surge in online shopping scams In one scheme, shoppers ordering gadgets or gym equipment are in for a rude surprise – they receive disposable face masks instead The post FBI warns of surge…

Twitter breach: Staff tricked by ‘phone spear phishing’

Read the original article: Twitter breach: Staff tricked by ‘phone spear phishing’ The attackers exploited the human factor to gain access to Twitter’s internal systems and the accounts of some of the world’s most prominent figures The post Twitter breach:…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe New ESET Threat Report is out – Defending against Thunderspy attacks – Thousands of databases wiped in Meow attacks The post Week in security with Tony Anscombe appeared first on…

ESET Threat Report Q2 2020

Read the original article: ESET Threat Report Q2 2020 A view of the Q2 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report Q2 2020…

FBI warns of disruptive DDoS amplification attacks

Read the original article: FBI warns of disruptive DDoS amplification attacks The Bureau expects cybercriminals to increasingly abuse new threat vectors for large-scale DDoS attacks The post FBI warns of disruptive DDoS amplification attacks appeared first on WeLiveSecurity   Advertise…

Almost 4,000 databases now wiped in ‘Meow’ attacks

Read the original article: Almost 4,000 databases now wiped in ‘Meow’ attacks The attackers and their motivations remain unknown; however, the incidents yet again highlight the risks of careless data security The post Almost 4,000 databases now wiped in ‘Meow’…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe VPN services accused of leaking personal data – Better security in Gmail, Meet and Chat – Data breach reports in 1H2020 The post Week in security with Tony Anscombe appeared…

Google adds security enhancements to Gmail, Meet and Chat

Read the original article: Google adds security enhancements to Gmail, Meet and Chat The tech giant introduces its own version of verified accounts in Gmail, rolls out increased moderation controls in Meet, and enhances phishing protection in Chat The post…

Argentine telecom company hit by major ransomware attack

Read the original article: Argentine telecom company hit by major ransomware attack Telecom Argentina says it has contained the attack and regained access to its systems without paying up The post Argentine telecom company hit by major ransomware attack appeared…

Week in security with Tony Anscombe

Read the original article: Week in security with Tony Anscombe Trojanized cryptocurrency trading apps targeting Mac users – An Android chat app turns out to be spyware – Twitter sustains a massive hack The post Week in security with Tony…

Mac cryptocurrency trading application rebranded, bundled with malware

Read the original article: Mac cryptocurrency trading application rebranded, bundled with malware ESET researchers lure GMERA malware operators to remotely control their Mac honeypots The post Mac cryptocurrency trading application rebranded, bundled with malware appeared first on WeLiveSecurity   Advertise…

High‑profile Twitter accounts hacked to promote Bitcoin scam

Read the original article: High‑profile Twitter accounts hacked to promote Bitcoin scam Tech titans and prominent politicians among victims of a sprawling hack that Twitter says leveraged its internal tools The post High‑profile Twitter accounts hacked to promote Bitcoin scam…