We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Fri, 29 May 2015 16:21:44 +0000 en-US hourly 1 Google to add permission controls in upcoming Android M http://www.welivesecurity.com/2015/05/29/google-add-permission-controls-upcoming-android-m/ http://www.welivesecurity.com/2015/05/29/google-add-permission-controls-upcoming-android-m/#comments Fri, 29 May 2015 16:20:52 +0000 http://www.welivesecurity.com/?p=63562 At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.

The post Google to add permission controls in upcoming Android M appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/29/google-add-permission-controls-upcoming-android-m/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/Android-M.jpg
Gaana music streaming hack could affect over 10 million users http://www.welivesecurity.com/2015/05/29/gaana-music-streaming-hack-affect-10-million-users/ http://www.welivesecurity.com/2015/05/29/gaana-music-streaming-hack-affect-10-million-users/#comments Fri, 29 May 2015 15:31:17 +0000 http://www.welivesecurity.com/?p=63544 One of India's most popular music streaming services, Gaana, was pulled offline after a hack resulted in a leak of data affecting more than 10 million users.

The post Gaana music streaming hack could affect over 10 million users appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/29/gaana-music-streaming-hack-affect-10-million-users/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/indian-music-streaming-ganaa.jpg
Phish Phood for Thought http://www.welivesecurity.com/2015/05/29/phish-phood-thought/ http://www.welivesecurity.com/2015/05/29/phish-phood-thought/#comments Fri, 29 May 2015 10:38:48 +0000 http://www.welivesecurity.com/?p=62997 In 2007, David Harley and Andrew Lee suggested at Virus Bulletin that poorly-designed phish quizzes did more harm than good. Has the picture changed much?

The post Phish Phood for Thought appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/29/phish-phood-thought/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/Phishphood.png
Irish businesses may be penalized over inadequate IT security http://www.welivesecurity.com/2015/05/28/irish-businesses-may-penalized-inadequate-security/ http://www.welivesecurity.com/2015/05/28/irish-businesses-may-penalized-inadequate-security/#comments Thu, 28 May 2015 15:59:16 +0000 http://www.welivesecurity.com/?p=63451 Irish businesses have been criticized for their IT security standards after it was revealed that a significant majority are not currently meeting the legal requirements.

The post Irish businesses may be penalized over inadequate IT security appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/28/irish-businesses-may-penalized-inadequate-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/irish-cybersecurity-businesses.jpg
Bug causes iPhones to crash when sent malicious text message http://www.welivesecurity.com/2015/05/28/bug-causes-iphones-crash-sent-malicious-text-message/ http://www.welivesecurity.com/2015/05/28/bug-causes-iphones-crash-sent-malicious-text-message/#comments Thu, 28 May 2015 13:26:17 +0000 http://www.welivesecurity.com/?p=63430 An exploit has been discovered that causes iPhones and iPads to reboot when sent a string of malicious text.

The post Bug causes iPhones to crash when sent malicious text message appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/28/bug-causes-iphones-crash-sent-malicious-text-message/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/15415264281_f99cd63d21_z.jpg
ESET uncovers another porn clicker on Google Play http://www.welivesecurity.com/2015/05/28/eset-uncovers-another-porn-clicker-google-play/ http://www.welivesecurity.com/2015/05/28/eset-uncovers-another-porn-clicker-google-play/#comments Thu, 28 May 2015 12:00:12 +0000 http://www.welivesecurity.com/?p=63345 Porn clickers pretending to be the the Dubsmash application have found their way back onto Google Play, a month after being removed.

The post ESET uncovers another porn clicker on Google Play appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/28/eset-uncovers-another-porn-clicker-google-play/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/Gefälschte_Dubsmash-Anwendungen_Google_Play.jpg
Cyber risk analysis, assessment, and management: an introduction http://www.welivesecurity.com/2015/05/28/cyber-risk-analysis-assessment-management/ http://www.welivesecurity.com/2015/05/28/cyber-risk-analysis-assessment-management/#comments Thu, 28 May 2015 11:22:03 +0000 http://www.welivesecurity.com/?p=63186 Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.

The post Cyber risk analysis, assessment, and management: an introduction appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/28/cyber-risk-analysis-assessment-management/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/risk-analysist.jpg
Hackers could track subway users via phone accelerometer data http://www.welivesecurity.com/2015/05/27/hackers-track-subway-users-via-phone-accelerometer-data/ http://www.welivesecurity.com/2015/05/27/hackers-track-subway-users-via-phone-accelerometer-data/#comments Wed, 27 May 2015 13:28:00 +0000 http://www.welivesecurity.com/?p=63352 Researchers from Nanjing University have found a way in which hackers could track a smartphone user on the subway - even when limited reception is available.

The post Hackers could track subway users via phone accelerometer data appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/27/hackers-track-subway-users-via-phone-accelerometer-data/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/new-york-subway-malware.jpg
Mobile banking security still a barrier for consumers http://www.welivesecurity.com/2015/05/27/mobile-banking-security-still-barrier-consumers/ http://www.welivesecurity.com/2015/05/27/mobile-banking-security-still-barrier-consumers/#comments Wed, 27 May 2015 11:29:03 +0000 http://www.welivesecurity.com/?p=63339 Customers are increasingly turning to mobile apps to make simple banking transactions, but a significant portion of those who don't bank on mobile devices cite security concerns as the reason.

The post Mobile banking security still a barrier for consumers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/27/mobile-banking-security-still-barrier-consumers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/mobile-banking-security.jpg
IRS hacker attack puts US tax payers at risk http://www.welivesecurity.com/2015/05/26/irs-hacker-attack/ http://www.welivesecurity.com/2015/05/26/irs-hacker-attack/#comments Tue, 26 May 2015 21:35:35 +0000 http://www.welivesecurity.com/?p=63322 The IRS has admitted that for more than two months malicious hackers targeted its systems, and managed to gain access to information about more than 100,000 tax payers.

The post IRS hacker attack puts US tax payers at risk appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/26/irs-hacker-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/irs-wide.jpeg
Bluetooth fitness trackers ‘a threat to privacy’ http://www.welivesecurity.com/2015/05/26/bluetooth-fitness-trackers-threat-privacy/ http://www.welivesecurity.com/2015/05/26/bluetooth-fitness-trackers-threat-privacy/#comments Tue, 26 May 2015 13:46:03 +0000 http://www.welivesecurity.com/?p=63240 Devices using Bluetooth Low Energy (BLE) to transmit their data can be intercepted by hackers, potentially exposing a trove of fitness data from wearables, IT Pro reports.

The post Bluetooth fitness trackers ‘a threat to privacy’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/26/bluetooth-fitness-trackers-threat-privacy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/activity-tracker-bluetooth-privacy.jpg
Dissecting Linux/Moose: a Linux Router-based Worm Hungry for Social Networks http://www.welivesecurity.com/2015/05/26/dissecting-linuxmoose/ http://www.welivesecurity.com/2015/05/26/dissecting-linuxmoose/#comments Tue, 26 May 2015 12:46:20 +0000 http://www.welivesecurity.com/?p=63153 A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.

The post Dissecting Linux/Moose: a Linux Router-based Worm Hungry for Social Networks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/26/dissecting-linuxmoose/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/moose.jpg
Moose – the router worm with an appetite for social networks http://www.welivesecurity.com/2015/05/26/moose-router-worm/ http://www.welivesecurity.com/2015/05/26/moose-router-worm/#comments Tue, 26 May 2015 12:45:44 +0000 http://www.welivesecurity.com/?p=63053 A new worm is infecting routers in order to commit social networking fraud, hijacking victims' internet connections in order to "like" posts and pages, "view" videos and "follow" other accounts.

The post Moose – the router worm with an appetite for social networks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/26/moose-router-worm/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/moose-623x425.jpeg
5 hackers who came over from the dark side http://www.welivesecurity.com/2015/05/25/5-hackers-who-came-over-from-the-dark-side/ http://www.welivesecurity.com/2015/05/25/5-hackers-who-came-over-from-the-dark-side/#comments Mon, 25 May 2015 11:59:34 +0000 http://www.welivesecurity.com/?p=62765 Five reformed hackers who turned their lives around to help in the fight against cybercrime, leaving their blackhat past behind.

The post 5 hackers who came over from the dark side appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/25/5-hackers-who-came-over-from-the-dark-side/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/Security-blackhats-who-went-whitehat.jpg
The wider world of security research output: webinars http://www.welivesecurity.com/2015/05/22/wider-world-security-research-output-webinars/ http://www.welivesecurity.com/2015/05/22/wider-world-security-research-output-webinars/#comments Fri, 22 May 2015 16:27:53 +0000 http://www.welivesecurity.com/?p=63194 Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.

The post The wider world of security research output: webinars appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/22/wider-world-security-research-output-webinars/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/webinar-chalk-board.jpg
Google reveals failure of ‘secret question’ password recall http://www.welivesecurity.com/2015/05/22/google-reveals-failure-secret-question-password-recall/ http://www.welivesecurity.com/2015/05/22/google-reveals-failure-secret-question-password-recall/#comments Fri, 22 May 2015 16:03:47 +0000 http://www.welivesecurity.com/?p=63088 A research paper from Google has looked into the difficulties of standard 'forgotten password' personal information verification.

The post Google reveals failure of ‘secret question’ password recall appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/22/google-reveals-failure-secret-question-password-recall/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/google-password-reminders-not-effective.jpg
Adult dating site hacked, leaking private information http://www.welivesecurity.com/2015/05/22/adult-dating-site-hacked-leaking-private-information/ http://www.welivesecurity.com/2015/05/22/adult-dating-site-hacked-leaking-private-information/#comments Fri, 22 May 2015 14:00:38 +0000 http://www.welivesecurity.com/?p=63081 Casual dating website 'Adult FriendFinder' has been hacked, leaking data from as many as 3.9 million accounts, according to an investigation by Channel 4 News.

The post Adult dating site hacked, leaking private information appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/22/adult-dating-site-hacked-leaking-private-information/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/adult-friend-finder-hacked.jpg
Apple bolsters app store security with 2FA and Touch ID http://www.welivesecurity.com/2015/05/22/apple-bolsters-app-store-security-with-2fa-and-touch-id/ http://www.welivesecurity.com/2015/05/22/apple-bolsters-app-store-security-with-2fa-and-touch-id/#comments Fri, 22 May 2015 12:15:51 +0000 http://www.welivesecurity.com/?p=63070 A new update to the Apple Store app for iPhone and iPad has bolstered its security features, adding two-factor authentication (2FA) and increased Touch ID support.

The post Apple bolsters app store security with 2FA and Touch ID appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/22/apple-bolsters-app-store-security-with-2fa-and-touch-id/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/apple-app-store.jpg
5 security questions to ask before clicking on a link http://www.welivesecurity.com/2015/05/22/5-security-questions-ask-clicking-link/ http://www.welivesecurity.com/2015/05/22/5-security-questions-ask-clicking-link/#comments Fri, 22 May 2015 11:59:40 +0000 http://www.welivesecurity.com/?p=62906 Should you trust that link? We Live Security runs down five quick security questions to ask before you click on a URL.

The post 5 security questions to ask before clicking on a link appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/22/5-security-questions-ask-clicking-link/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/should-i-click-that-link-623x4101.jpg
Unboxing Linux/Mumblehard http://www.welivesecurity.com/videos/unboxing-linuxmumblehard/ http://www.welivesecurity.com/videos/unboxing-linuxmumblehard/#comments Fri, 22 May 2015 11:36:57 +0000 http://www.welivesecurity.com/?post_type=post_video&p=63073 Researcher Alexis Dorais-Joncas explains the new strain of Linux malware, uncovered by ESET researchers.

The post Unboxing Linux/Mumblehard appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/unboxing-linuxmumblehard/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/05.jpg
Scareware: Fake Minecraft apps Scare Hundreds of Thousands on Google Play http://www.welivesecurity.com/2015/05/22/scareware-fake-minecraft-apps-scare-hundreds-thousands-google-play/ http://www.welivesecurity.com/2015/05/22/scareware-fake-minecraft-apps-scare-hundreds-thousands-google-play/#comments Fri, 22 May 2015 08:00:29 +0000 http://www.welivesecurity.com/?p=63030 ESET has discovered over 30 scareware apps available for download from the Google Play store. The apps have been installed by more than 600,000 Android users.

The post Scareware: Fake Minecraft apps Scare Hundreds of Thousands on Google Play appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/22/scareware-fake-minecraft-apps-scare-hundreds-thousands-google-play/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/scareware_minecraft-e1432307745384-623x4001.jpg
CareFirst data breach leaves 1.1m health insurance customers vulnerable http://www.welivesecurity.com/2015/05/21/carefirst-data-breach-leaves-1-1m-health-insurance-customers-vulnerable/ http://www.welivesecurity.com/2015/05/21/carefirst-data-breach-leaves-1-1m-health-insurance-customers-vulnerable/#comments Thu, 21 May 2015 16:03:26 +0000 http://www.welivesecurity.com/?p=63025 More than 1.1 million health insurance customers have been left vulnerable by a vast data breach, after criminals gained access to a CareFirst database in a "sophisticated cyberattack."

The post CareFirst data breach leaves 1.1m health insurance customers vulnerable appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/21/carefirst-data-breach-leaves-1-1m-health-insurance-customers-vulnerable/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/health-insurance-hack-anthem-1.jpg
DDoS attacks have doubled in a year, says Akamai http://www.welivesecurity.com/2015/05/21/ddos-attacks-doubled-year-says-akamai/ http://www.welivesecurity.com/2015/05/21/ddos-attacks-doubled-year-says-akamai/#comments Thu, 21 May 2015 15:19:04 +0000 http://www.welivesecurity.com/?p=63015 Distributed Denial of Service (DDoS) attacks are on the rise, according to cloud service provider Akamai, with more than double the number reported from this time a year ago.

The post DDoS attacks have doubled in a year, says Akamai appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/21/ddos-attacks-doubled-year-says-akamai/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/DDOS.jpg
What app permissions should I be wary of? http://www.welivesecurity.com/2015/05/21/app-permissions-wary/ http://www.welivesecurity.com/2015/05/21/app-permissions-wary/#comments Thu, 21 May 2015 13:49:00 +0000 http://www.welivesecurity.com/?p=62600 Mobile applications increasingly want access to various functions on your smartphones and tablets, such as your location and contacts book. But some of these app permissions should not be granted.

The post What app permissions should I be wary of? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/21/app-permissions-wary/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/apps-track-you-every-three-minutes.jpg
Logjam attack leaves tens of thousands of HTTPS websites vulnerable http://www.welivesecurity.com/2015/05/20/logjam-attack-leaves-tens-thousands-https-websites-vulnerable/ http://www.welivesecurity.com/2015/05/20/logjam-attack-leaves-tens-thousands-https-websites-vulnerable/#comments Wed, 20 May 2015 16:00:50 +0000 http://www.welivesecurity.com/?p=62958 Tens of thousands of HTTPS websites, mail servers and other internet services could be left vulnerable by a flaw that would allow criminals to snoop and modify encrypted data.

The post Logjam attack leaves tens of thousands of HTTPS websites vulnerable appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/20/logjam-attack-leaves-tens-thousands-https-websites-vulnerable/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/https-security-attack.jpg
Researchers design ‘decoy password’ system to fool hackers http://www.welivesecurity.com/2015/05/20/researchers-design-decoy-password-system-fool-hackers/ http://www.welivesecurity.com/2015/05/20/researchers-design-decoy-password-system-fool-hackers/#comments Wed, 20 May 2015 14:28:02 +0000 http://www.welivesecurity.com/?p=62960 Researchers have developed a system to protect password databases, allowing hackers to believe they have cracked the file, only to be given fake credentials.

The post Researchers design ‘decoy password’ system to fool hackers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/20/researchers-design-decoy-password-system-fool-hackers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/change-your-password.jpg
Google and Apple among tech giants urging Obama to block phone surveillance http://www.welivesecurity.com/2015/05/19/google-and-apple-among-tech-giants-urging-obama-to-block-phone-surveillance/ http://www.welivesecurity.com/2015/05/19/google-and-apple-among-tech-giants-urging-obama-to-block-phone-surveillance/#comments Tue, 19 May 2015 16:08:20 +0000 http://www.welivesecurity.com/?p=62904 Google and Apple have signed a letter to President Barack Obama urging him to reject any proposal that would grant police access to encrypted phone data.

The post Google and Apple among tech giants urging Obama to block phone surveillance appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/19/google-and-apple-among-tech-giants-urging-obama-to-block-phone-surveillance/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/01/President-Obama-2.jpg
Popular GTA V mods come with unwanted malware http://www.welivesecurity.com/2015/05/19/popular-gta-v-mods-come-unwanted-malware/ http://www.welivesecurity.com/2015/05/19/popular-gta-v-mods-come-unwanted-malware/#comments Tue, 19 May 2015 14:24:33 +0000 http://www.welivesecurity.com/?p=62888 Two popular Grand Theft Auto V modifications have been found to contain unwanted additional malware, according to The Escapist.

The post Popular GTA V mods come with unwanted malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/19/popular-gta-v-mods-come-unwanted-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/Grand-Theft-Auto-malware-623x4101.jpg
Aryeh Goretsky talks “very promising” Windows 10 security http://www.welivesecurity.com/2015/05/19/aryeh-goretsky-threats-windows-past-present-future/ http://www.welivesecurity.com/2015/05/19/aryeh-goretsky-threats-windows-past-present-future/#comments Tue, 19 May 2015 13:00:04 +0000 http://www.welivesecurity.com/?p=61836 Windows expert Aryeh Goretsky discusses threats to Windows past, present and future. Will Windows 10 mean hackers have to work harder?

The post Aryeh Goretsky talks “very promising” Windows 10 security appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/19/aryeh-goretsky-threats-windows-past-present-future/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/Windows.jpg
Love hurts: Online dating scams are Australia’s top financial fraud http://www.welivesecurity.com/2015/05/18/love-hurts-online-dating-scams-australias-top-financial-fraud/ http://www.welivesecurity.com/2015/05/18/love-hurts-online-dating-scams-australias-top-financial-fraud/#comments Mon, 18 May 2015 15:37:42 +0000 http://www.welivesecurity.com/?p=62856 Australians were tricked out of around AUS$82 million (US$66 million) during 2014, with online dating scams accounting for the biggest losses.

The post Love hurts: Online dating scams are Australia’s top financial fraud appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/18/love-hurts-online-dating-scams-australias-top-financial-fraud/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/online-dating-scams-australia.jpg
UK government amends hacking laws to give intelligence service immunity http://www.welivesecurity.com/2015/05/18/uk-government-amends-hacking-laws-give-intelligence-service-immunity/ http://www.welivesecurity.com/2015/05/18/uk-government-amends-hacking-laws-give-intelligence-service-immunity/#comments Mon, 18 May 2015 13:58:43 +0000 http://www.welivesecurity.com/?p=62848 The British government has passed legislation amending the Computer Misuse Act to prevent GCHQ, the police and intelligence services from prosecution over any hacking into mobile phones and computers.

The post UK government amends hacking laws to give intelligence service immunity appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/18/uk-government-amends-hacking-laws-give-intelligence-service-immunity/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/gchq-want-backdoors-into-mobiles.jpg
Apple seeks to block sale of RadioShack customer data http://www.welivesecurity.com/2015/05/15/apple-seeks-block-sale-radioshack-customer-data/ http://www.welivesecurity.com/2015/05/15/apple-seeks-block-sale-radioshack-customer-data/#comments Fri, 15 May 2015 14:01:23 +0000 http://www.welivesecurity.com/?p=62777 Apple has filed a court objection against the sale of RadioShack customer data for those who had purchased its products, reports Ars Technica.

The post Apple seeks to block sale of RadioShack customer data appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/15/apple-seeks-block-sale-radioshack-customer-data/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/radioshack-apple-legal-dispute.jpg
How did the Internet change the everyday work of a security researcher? http://www.welivesecurity.com/2015/05/15/internet-change-everyday-work-security-researcher/ http://www.welivesecurity.com/2015/05/15/internet-change-everyday-work-security-researcher/#comments Fri, 15 May 2015 10:50:54 +0000 http://www.welivesecurity.com/?p=62710 Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet's impact on security research.

The post How did the Internet change the everyday work of a security researcher? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/15/internet-change-everyday-work-security-researcher/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/Weltfernmeldetag.jpg
Google turns down 60 percent of ‘right to be forgotten’ requests http://www.welivesecurity.com/2015/05/15/google-turns-down-60-percent-of-right-to-be-forgotten-requests/ http://www.welivesecurity.com/2015/05/15/google-turns-down-60-percent-of-right-to-be-forgotten-requests/#comments Fri, 15 May 2015 10:24:20 +0000 http://www.welivesecurity.com/?p=62762 A year after Google introduced its controversial 'right to be forgotten' feature, the search giant has published some statistics about its implementation.

The post Google turns down 60 percent of ‘right to be forgotten’ requests appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/15/google-turns-down-60-percent-of-right-to-be-forgotten-requests/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/google-right-to-be-forgotten-requests-turned-down-623x4101.jpg
Quick thinking hostage calls police via online pizza delivery http://www.welivesecurity.com/2015/05/14/quick-thinking-hostage-calls-police-via-online-pizza-delivery/ http://www.welivesecurity.com/2015/05/14/quick-thinking-hostage-calls-police-via-online-pizza-delivery/#comments Thu, 14 May 2015 14:53:45 +0000 http://www.welivesecurity.com/?p=62725 A quick-thinking Florida mother used an online takeaway order to raise the alarm, after her partner took the woman and her three children hostage.

The post Quick thinking hostage calls police via online pizza delivery appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/14/quick-thinking-hostage-calls-police-via-online-pizza-delivery/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/pizza-hostages-hidden-911-message.jpg
Russian hacking group APT28 planned attacks against global banks http://www.welivesecurity.com/2015/05/14/russian-hacking-group-apt28-planned-attacks-global-banks/ http://www.welivesecurity.com/2015/05/14/russian-hacking-group-apt28-planned-attacks-global-banks/#comments Thu, 14 May 2015 13:18:10 +0000 http://www.welivesecurity.com/?p=62722 A Russian hacking group planned on launching cyberattacks against several banks around the world, according to SC Magazine.

The post Russian hacking group APT28 planned attacks against global banks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/14/russian-hacking-group-apt28-planned-attacks-global-banks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/global-banks-targeted-by-russian-hacking-group.jpg
5 signs that an app could be risky http://www.welivesecurity.com/2015/05/14/5-signs-app-risky/ http://www.welivesecurity.com/2015/05/14/5-signs-app-risky/#comments Thu, 14 May 2015 12:34:20 +0000 http://www.welivesecurity.com/?p=62308 Not all apps are worth your time and money. We Live Security looks at five signs the app you’re about to download could be risky, and worth investigating further.

The post 5 signs that an app could be risky appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/14/5-signs-app-risky/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/phone-scam.jpg
Jamie Oliver website makes a meal of malware clean-up http://www.welivesecurity.com/2015/05/13/jamie-oliver-website-makes-meal-malware-clean/ http://www.welivesecurity.com/2015/05/13/jamie-oliver-website-makes-meal-malware-clean/#comments Wed, 13 May 2015 15:31:01 +0000 http://www.welivesecurity.com/?p=62621 The website of celebrity TV chef and food activist Jamie Oliver has been compromised with malware for the third time this year, potentially infecting the computers of the site's visitors.

The post Jamie Oliver website makes a meal of malware clean-up appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/13/jamie-oliver-website-makes-meal-malware-clean/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/jamie-oliver-malware.jpg
The surprising fees hackers charge for their services http://www.welivesecurity.com/2015/05/13/the-surprising-fees-hackers-charge-for-their-services/ http://www.welivesecurity.com/2015/05/13/the-surprising-fees-hackers-charge-for-their-services/#comments Wed, 13 May 2015 10:13:42 +0000 http://www.welivesecurity.com/?p=62591 Hackers advertise their nefarious services to potential customers for as little as $90 for Gmail and $350 to access a target's Facebook account, reports The Daily Mail.

The post The surprising fees hackers charge for their services appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/13/the-surprising-fees-hackers-charge-for-their-services/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/cost-of-hiring-a-hacker.jpg
New Facebook scam promises “shocking video,” but contains only malware http://www.welivesecurity.com/2015/05/12/new-facebook-scam-promises-shocking-video-contains-malware/ http://www.welivesecurity.com/2015/05/12/new-facebook-scam-promises-shocking-video-contains-malware/#comments Tue, 12 May 2015 15:05:54 +0000 http://www.welivesecurity.com/?p=62532 When you see what this Facebook clickbait really links to, your jaw will drop.

The post New Facebook scam promises “shocking video,” but contains only malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/12/new-facebook-scam-promises-shocking-video-contains-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Facebook-abre-enlace-Tor.jpg
5 practical tips to avoid ransomware in your email http://www.welivesecurity.com/2015/05/12/5-practical-tips-avoid-ransomware-email/ http://www.welivesecurity.com/2015/05/12/5-practical-tips-avoid-ransomware-email/#comments Tue, 12 May 2015 13:00:02 +0000 http://www.welivesecurity.com/?p=62466 Tips to avoid ransomware in your email - a common way for extortion-based malware to propagate itself.

The post 5 practical tips to avoid ransomware in your email appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/12/5-practical-tips-avoid-ransomware-email/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/ransomware_correo.jpg
Whistleblower claims cybersecurity firm extorted clients http://www.welivesecurity.com/2015/05/12/whistleblower-claims-cybersecurity-firm-hacked-clients/ http://www.welivesecurity.com/2015/05/12/whistleblower-claims-cybersecurity-firm-hacked-clients/#comments Tue, 12 May 2015 11:57:20 +0000 http://www.welivesecurity.com/?p=62525 A cybersecurity firm is accused of deceiving potential clients in order to extort business, according to whistle blower testimony to the FTC.

The post Whistleblower claims cybersecurity firm extorted clients appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/12/whistleblower-claims-cybersecurity-firm-hacked-clients/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/federal-court-e1431431773540.jpg
Photobucket hackers face charges over photo-stealing app http://www.welivesecurity.com/2015/05/11/photobucket-hackers-face-charges-photo-stealing-app/ http://www.welivesecurity.com/2015/05/11/photobucket-hackers-face-charges-photo-stealing-app/#comments Mon, 11 May 2015 15:54:59 +0000 http://www.welivesecurity.com/?p=62476 Two men were arrested last week for allegedly developing hacking software that steals user information and photos from the image-hosting website Photobucket.

The post Photobucket hackers face charges over photo-stealing app appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/11/photobucket-hackers-face-charges-photo-stealing-app/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/photobucket-photo-arrested.jpg
Study shows fear of weakened security on new payment technology http://www.welivesecurity.com/2015/05/11/study-shows-fear-weakened-security-new-payment-technology/ http://www.welivesecurity.com/2015/05/11/study-shows-fear-weakened-security-new-payment-technology/#comments Mon, 11 May 2015 15:47:34 +0000 http://www.welivesecurity.com/?p=62478 A new study by the Ponemon Institute has revealed anxiety at the security of new payment systems, pressured by consumer demand, reports SC Magazine.

The post Study shows fear of weakened security on new payment technology appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/11/study-shows-fear-weakened-security-new-payment-technology/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/US-payment-terminals-bricked...-but-not-by-malware.jpg
MMORPG hacker stripped to his underwear and executed online, watched by almost a million people http://www.welivesecurity.com/2015/05/11/hacker-execution/ http://www.welivesecurity.com/2015/05/11/hacker-execution/#comments Mon, 11 May 2015 10:12:25 +0000 http://www.welivesecurity.com/?p=62444 Guild Wars 2's security team serves tough justice on teleporting hacker.

The post MMORPG hacker stripped to his underwear and executed online, watched by almost a million people appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/11/hacker-execution/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/darkside.jpeg
NSA phone surveillance ruled illegal by US appeals court http://www.welivesecurity.com/2015/05/08/nsa-phone-surveillance-ruled-illegal-us-appeals-court/ http://www.welivesecurity.com/2015/05/08/nsa-phone-surveillance-ruled-illegal-us-appeals-court/#comments Fri, 08 May 2015 16:23:58 +0000 http://www.welivesecurity.com/?p=62386 The mass collection of American phone records and metadata by the National Security Agency (NSA) has been ruled illegal by a US appeals court.

The post NSA phone surveillance ruled illegal by US appeals court appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/08/nsa-phone-surveillance-ruled-illegal-us-appeals-court/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/NSA-surveilance-illegal.jpg
Is online voting a security risk? http://www.welivesecurity.com/2015/05/07/online-voting-security-risk/ http://www.welivesecurity.com/2015/05/07/online-voting-security-risk/#comments Thu, 07 May 2015 17:11:11 +0000 http://www.welivesecurity.com/?p=62373 The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes reality, are we opening ourselves up to vote rigging by power-hungry politicians or fame-seeking hackers?

The post Is online voting a security risk? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/07/online-voting-security-risk/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/online-voting.jpg
The big small business security challenge: mobile and BYOD http://www.welivesecurity.com/2015/05/07/small-business-security-mobile-byod/ http://www.welivesecurity.com/2015/05/07/small-business-security-mobile-byod/#comments Thu, 07 May 2015 13:40:24 +0000 http://www.welivesecurity.com/?p=63128 In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.

The post The big small business security challenge: mobile and BYOD appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/07/small-business-security-mobile-byod/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/mobile-device-stacks.png
CPL Malware in Brazil: somewhere between banking trojans and malicious emails http://www.welivesecurity.com/2015/05/07/cpl-malware-brazil-white-paper-now-available/ http://www.welivesecurity.com/2015/05/07/cpl-malware-brazil-white-paper-now-available/#comments Thu, 07 May 2015 12:40:49 +0000 http://www.welivesecurity.com/?p=62223 Not only is Brazil one of the most populated countries in the world, but it is also one of the countries with the highest percentage of Internet users using online banking. The latest research from ESET is now available: CPL Malware in Brazil.

The post CPL Malware in Brazil: somewhere between banking trojans and malicious emails appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/07/cpl-malware-brazil-white-paper-now-available/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/3185717616_d326662d60_z-623x4251.jpg
Millions of WordPress sites left vulnerable by plugin flaw http://www.welivesecurity.com/2015/05/07/millions-wordpress-sites-left-vulnerable-plugin-flaw/ http://www.welivesecurity.com/2015/05/07/millions-wordpress-sites-left-vulnerable-plugin-flaw/#comments Thu, 07 May 2015 10:39:04 +0000 http://www.welivesecurity.com/?p=62330 Millions of WordPress sites are vulnerable to a scripting flaw found in two popular plugins, one of which can be found in the default installation of the blogging platform.

The post Millions of WordPress sites left vulnerable by plugin flaw appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/05/07/millions-wordpress-sites-left-vulnerable-plugin-flaw/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/wordpress-plugin-vulnerability.jpg