WeLiveSecurity WeLiveSecurity
- RDP remains a security concern – Week in security with Tony Anscombeon March 29, 2024 at 10:24 am
Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result
- Cybercriminals play dirty: A look back at 10 cyber hits on the sporting worldon March 28, 2024 at 10:30 am
This rundown of 10 cyberattacks against the sports industry shows why every team needs to keep its eyes on the ball when it comes to cybersecurity
- Borrower beware: Common loan scams and how to avoid themon March 26, 2024 at 10:30 am
Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan.
- Cybersecurity starts at home: Help your children stay safe online with open conversationson March 25, 2024 at 10:30 am
Struggle to know how to help children and teens stay safe in cyberspace? A good ol’ fashioned chat is enough to put them on the right track.
- AceCryptor attacks surge in Europe – Week in security with Tony Anscombeon March 22, 2024 at 12:21 pm
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT
- Rescoms rides waves of AceCryptor spamon March 20, 2024 at 10:30 am
Insight into ESET telemetry statistics about AceCryptor in H2 2023 with a focus on Rescoms campaigns in European countries
- A prescription for privacy protection: Exercise caution when using a mobile health appon March 19, 2024 at 10:30 am
Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data
- Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombeon March 15, 2024 at 11:20 am
Healthcare organizations remain firmly in attackers’ crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023
- Threat intelligence explained | Unlocked 403: A cybersecurity podcaston March 14, 2024 at 1:30 pm
We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats
- How to share sensitive files securely onlineon March 13, 2024 at 10:30 am
Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe
- Election cybersecurity: Protecting the ballot box and building trust in election integrityon March 12, 2024 at 10:30 am
What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?
- APT attacks taking aim at Tibetans – Week in security with Tony Anscombeon March 8, 2024 at 12:35 pm
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor
- Evasive Panda leverages Monlam Festival to target Tibetanson March 7, 2024 at 10:30 am
ESET researchers uncover strategic web compromise and supply-chain attacks targeting Tibetans
- Top 10 scams targeting seniors – and how to keep your money safeon March 6, 2024 at 10:30 am
The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud.
- Irresistible: Hooks, habits and why you can’t put down your phoneon March 5, 2024 at 10:30 am
Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices.
- Deceptive AI content and 2024 elections – Week in security with Tony Anscombeon March 1, 2024 at 11:18 am
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year
- Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenseson February 29, 2024 at 10:30 am
Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor
- Vulnerabilities in business VPNs under the spotlighton February 28, 2024 at 10:30 am
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk
- 10 things to avoid posting on social media – and whyon February 26, 2024 at 10:30 am
Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.
- PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombeon February 23, 2024 at 12:32 pm
Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects
- Everything you need to know about IP grabberson February 22, 2024 at 10:30 am
Unsuspecting users beware, IP grabbers do not ask for your permission.
- Operation Texonto: Information operation targeting Ukrainian speakers in the context of the waron February 21, 2024 at 5:00 am
A mix of PSYOPs, espionage and … fake Canadian pharmacies!
- Watching out for the fakes: How to spot online disinformationon February 20, 2024 at 10:30 am
Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes?
- Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombeon February 16, 2024 at 2:05 pm
Here’s how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals
- What is AI, really? | Unlocked 403: A cybersecurity podcaston February 15, 2024 at 3:32 pm
Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack AI’s basics, applications and broader implications.
- The art of digital sleuthing: How digital forensics unlocks the truthon February 14, 2024 at 10:30 am
Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell
- Deepfakes in the global election year of 2024: A weapon of mass deception?on February 13, 2024 at 10:30 am
As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern
- Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombeon February 9, 2024 at 1:46 pm
Called a “watershed year for ransomware”, 2023 marked a reversal from the decline in ransomware payments observed in the previous year
- The buck stops here: Why the stakes are high for CISOson February 8, 2024 at 10:30 am
Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?
- Left to their own devices: Security for employees using personal devices for workon February 6, 2024 at 10:30 am
As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it