We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Fri, 24 Oct 2014 19:35:11 +0000 en-US hourly 1 New Tor routers seeking crowdfunding appear as Anonabox is pulled by Kickstarter http://www.welivesecurity.com/2014/10/24/new-crowdfunding-tor-routers-appear-anonabox-pulled-kickstarter/ http://www.welivesecurity.com/2014/10/24/new-crowdfunding-tor-routers-appear-anonabox-pulled-kickstarter/#comments Fri, 24 Oct 2014 16:52:14 +0000 New Tor routers seeking crowdfunding appear as Anonabox is pulled by Kickstarter http://www.welivesecurity.com/?p=53294 A selection of rival privacy conscious Tor routers have appeared on crowdfunding sites after the Anonabox was surprisingly pulled just days after smashing its modest funding targets.

The post New Tor routers seeking crowdfunding appear as Anonabox is pulled by Kickstarter appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/new-crowdfunding-tor-routers-appear-anonabox-pulled-kickstarter/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Screen-Shot-2014-10-14-at-16.47.00.png
Twitter: “We’re finally getting rid of the password” http://www.welivesecurity.com/2014/10/24/twitter-finally-getting-rid-password/ http://www.welivesecurity.com/2014/10/24/twitter-finally-getting-rid-password/#comments Fri, 24 Oct 2014 16:09:03 +0000 Twitter: “We’re finally getting rid of the password” http://www.welivesecurity.com/?p=53263 Popular microblogging platform Twitter is taking bold steps to try and put an end to the password as we know it, according to Sky News.

The post Twitter: “We’re finally getting rid of the password” appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/twitter-finally-getting-rid-password/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Twitter-were-getting-rid-of-the-password.jpg
Could hackers give you a heart attack or drugs overdose? US authorities investigate http://www.welivesecurity.com/2014/10/24/hacker-heart-attack-medical/ http://www.welivesecurity.com/2014/10/24/hacker-heart-attack-medical/#comments Fri, 24 Oct 2014 15:03:46 +0000 Could hackers give you a heart attack or drugs overdose? US authorities investigate http://www.welivesecurity.com/?p=53252 There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.

The post Could hackers give you a heart attack or drugs overdose? US authorities investigate appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/hacker-heart-attack-medical/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/xray-623x425-1.jpeg
Ready, set, shop: 10 top tips for a safe shopping season http://www.welivesecurity.com/2014/10/24/ready-set-shop-10-top-tips-safe-shopping-season/ http://www.welivesecurity.com/2014/10/24/ready-set-shop-10-top-tips-safe-shopping-season/#comments Fri, 24 Oct 2014 14:45:15 +0000 Ready, set, shop: 10 top tips for a safe shopping season http://www.welivesecurity.com/?p=53188 Tips for safe holiday shopping: whether you shop online or at the mall, there are some simple strategies that can protect your bank accounts and payment cards against criminal hackers and scammers.

The post Ready, set, shop: 10 top tips for a safe shopping season appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/ready-set-shop-10-top-tips-safe-shopping-season/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/card-swipe-640.png
Counter surveillance tech – can gadgets spy-proof your life? http://www.welivesecurity.com/2014/10/24/counter-surveillance/ http://www.welivesecurity.com/2014/10/24/counter-surveillance/#comments Fri, 24 Oct 2014 14:19:09 +0000 Counter surveillance tech – can gadgets spy-proof your life? http://www.welivesecurity.com/?p=53229 Over the past few years, counter surveillance gadgets which might have been the preserve of secretive government departments a decade ago have suddenly hit mainstream shops - from Mission Impossible-stlye self-destructing drives to some rather eerie counter-surveillance masks.

The post Counter surveillance tech – can gadgets spy-proof your life? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/counter-surveillance/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/masky.jpg
Top 5 Scariest Zombie Botnets http://www.welivesecurity.com/2014/10/23/top-5-scariest-zombie-botnets/ http://www.welivesecurity.com/2014/10/23/top-5-scariest-zombie-botnets/#comments Thu, 23 Oct 2014 15:45:05 +0000 Top 5 Scariest Zombie Botnets http://www.welivesecurity.com/?p=53137 An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

The post Top 5 Scariest Zombie Botnets appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/23/top-5-scariest-zombie-botnets/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/zombie-network-infection.png
Shopping safely with Amazon http://www.welivesecurity.com/videos/shopping-safely-amazon/ http://www.welivesecurity.com/videos/shopping-safely-amazon/#comments Thu, 23 Oct 2014 14:54:15 +0000 Shopping safely with Amazon http://www.welivesecurity.com/?post_type=post_video&p=53170 Online shopping can be risky even if you use world renowned websites such as Amazon. Take a look at our top tips for how to shop safely with the online store.

The post Shopping safely with Amazon appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/shopping-safely-amazon/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/05.jpg
How to speed up your computer http://www.welivesecurity.com/videos/speed-computer/ http://www.welivesecurity.com/videos/speed-computer/#comments Thu, 23 Oct 2014 14:48:02 +0000 How to speed up your computer http://www.welivesecurity.com/?post_type=post_video&p=53166 A slow computer can be both frustrating and time consuming, so we’ve provided a few basic tips to help give your computer its speed back.

The post How to speed up your computer appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/speed-computer/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/04.jpg
Yahoo, Match and AOL hit by ransomware http://www.welivesecurity.com/2014/10/23/yahoo-match-aol-hit-ransomware/ http://www.welivesecurity.com/2014/10/23/yahoo-match-aol-hit-ransomware/#comments Thu, 23 Oct 2014 14:40:36 +0000 Yahoo, Match and AOL hit by ransomware http://www.welivesecurity.com/?p=53157 Cybercriminals taking advantage of a 'malvertising' attack on big name sites including Yahoo!, Match.com and AOL were making in the region of $25,000 per day, according to Forbes.

The post Yahoo, Match and AOL hit by ransomware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/23/yahoo-match-aol-hit-ransomware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/ransomware.jpg
The Evolution of Webinject http://www.welivesecurity.com/2014/10/23/evolution-webinject/ http://www.welivesecurity.com/2014/10/23/evolution-webinject/#comments Thu, 23 Oct 2014 11:33:44 +0000 The Evolution of Webinject http://www.welivesecurity.com/?p=53059 Last month, we presented “The Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.

The post The Evolution of Webinject appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/23/evolution-webinject/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/webinject_inyeccion_web.jpg
Windows 10 to tighten security with prominent 2FA http://www.welivesecurity.com/2014/10/23/windows-10-tighten-security-prominent-two-factor-authentication/ http://www.welivesecurity.com/2014/10/23/windows-10-tighten-security-prominent-two-factor-authentication/#comments Thu, 23 Oct 2014 10:50:32 +0000 Windows 10 to tighten security with prominent 2FA http://www.welivesecurity.com/?p=53145 Microsoft is taking aim at traditional single password systems with the upcoming version of Windows, by including build in two-factor authentication according to ZDNet, which describes the move as "audacious plans to tighten security".

The post Windows 10 to tighten security with prominent 2FA appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/23/windows-10-tighten-security-prominent-two-factor-authentication/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Windows-10-to-include-two-factor-authentication.jpg
iCloud users in China under attack. But who could be after their passwords? http://www.welivesecurity.com/2014/10/22/icloud-users-china-attack-passwords/ http://www.welivesecurity.com/2014/10/22/icloud-users-china-attack-passwords/#comments Wed, 22 Oct 2014 16:03:14 +0000 iCloud users in China under attack. But who could be after their passwords? http://www.welivesecurity.com/?p=53100 Make sure you are running a half-decent browser, don't ignore browser security warnings, and enable two-factor authentication.

That appears to be the lesson to learn from the latest attack on Chinese internet users.

The post iCloud users in China under attack. But who could be after their passwords? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/22/icloud-users-china-attack-passwords/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/icloud-china-wide.jpeg
UK takes aim at serious hacking offenses with planned life sentences http://www.welivesecurity.com/2014/10/22/uk-takes-aim-serious-hacking-offenses-planned-life-sentences/ http://www.welivesecurity.com/2014/10/22/uk-takes-aim-serious-hacking-offenses-planned-life-sentences/#comments Wed, 22 Oct 2014 15:46:30 +0000 UK takes aim at serious hacking offenses with planned life sentences http://www.welivesecurity.com/?p=53088 Law makers in Britain are discussing a dramatic increase in sentencing for serious hacking offences, according to The Register. Currently in discussion in the country's upper house, The House of Lords, the move looks to overhaul the Computer Misuse Act 1990, and includes a possible life sentence for serious hackers.

The post UK takes aim at serious hacking offenses with planned life sentences appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/22/uk-takes-aim-serious-hacking-offenses-planned-life-sentences/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/UK-takes-aim-at-serious-hacking-offenses-with-planned-life-sentences.jpg
Top 5 tips for securing your PC http://www.welivesecurity.com/videos/top-5-tips-securing-pc-2/ http://www.welivesecurity.com/videos/top-5-tips-securing-pc-2/#comments Wed, 22 Oct 2014 12:39:57 +0000 Top 5 tips for securing your PC http://www.welivesecurity.com/?post_type=post_video&p=53077 Securing your PC isn't as complex as it first appears. Here's five tips to help keep your documents safe and threats at bay.

The post Top 5 tips for securing your PC appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/top-5-tips-securing-pc-2/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/02.jpg
Google now offers USB key authentication http://www.welivesecurity.com/2014/10/22/google-now-offers-usb-key-authentication/ http://www.welivesecurity.com/2014/10/22/google-now-offers-usb-key-authentication/#comments Wed, 22 Oct 2014 11:40:01 +0000 Google now offers USB key authentication http://www.welivesecurity.com/?p=53068 Google has added an extra layer of security to its browser, by introducing USB authentication to Chrome, the company has announced in an official blog post.

The post Google now offers USB key authentication appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/22/google-now-offers-usb-key-authentication/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Google-now-offers-USB-key-authentication.jpg
Botnet malware: What it is and how to fight it http://www.welivesecurity.com/2014/10/22/botnet-malware-fight/ http://www.welivesecurity.com/2014/10/22/botnet-malware-fight/#comments Wed, 22 Oct 2014 09:21:35 +0000 Botnet malware: What it is and how to fight it http://www.welivesecurity.com/?p=52935 Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

The post Botnet malware: What it is and how to fight it appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/22/botnet-malware-fight/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/5001818922_f30d953f07_z1.jpg
Proof-of-concept worm can attack network attached storage http://www.welivesecurity.com/2014/10/21/proof-concept-worm-can-attack-network-attached-storage/ http://www.welivesecurity.com/2014/10/21/proof-concept-worm-can-attack-network-attached-storage/#comments Tue, 21 Oct 2014 16:00:24 +0000 Proof-of-concept worm can attack network attached storage http://www.welivesecurity.com/?p=52984 A proof-of-concept worm that can hunt network attached storage (or NAS) devices has been created by a security researcher. According to Tech World, the worm can target devices created by three different manufacturers.

The post Proof-of-concept worm can attack network attached storage appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/21/proof-concept-worm-can-attack-network-attached-storage/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Computer-worm.jpg
Myths about malware: an exploit is the same as malware http://www.welivesecurity.com/2014/10/21/myths-about-malware-exploit-is-the-same-as-malware/ http://www.welivesecurity.com/2014/10/21/myths-about-malware-exploit-is-the-same-as-malware/#comments Tue, 21 Oct 2014 14:32:03 +0000 Myths about malware: an exploit is the same as malware http://www.welivesecurity.com/?p=52142 In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.

The post Myths about malware: an exploit is the same as malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/21/myths-about-malware-exploit-is-the-same-as-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/08/exploit.jpg
Staples the latest to be hit by credit card breach? http://www.welivesecurity.com/2014/10/21/staples-latest-hit-credit-card-breach/ http://www.welivesecurity.com/2014/10/21/staples-latest-hit-credit-card-breach/#comments Tue, 21 Oct 2014 11:25:14 +0000 Staples the latest to be hit by credit card breach? http://www.welivesecurity.com/?p=52954 Stationary and office supply store Staples is the latest company to be dealing with a credit and debit card breach, according to Brian Krebs at Krebs on Security.

The post Staples the latest to be hit by credit card breach? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/21/staples-latest-hit-credit-card-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Staples-credit-card-breach.jpg
Facebook scans ‘paste sites’ for leaked usernames and passwords http://www.welivesecurity.com/2014/10/20/facebook-scans-paste-sites-leaked-usernames-passwords/ http://www.welivesecurity.com/2014/10/20/facebook-scans-paste-sites-leaked-usernames-passwords/#comments Mon, 20 Oct 2014 16:44:54 +0000 Facebook scans ‘paste sites’ for leaked usernames and passwords http://www.welivesecurity.com/?p=52925 Facebook has a system in place to scan public 'paste' sites for email address and password combinations to stay one step ahead of possible leaks, according to The Register.

The post Facebook scans ‘paste sites’ for leaked usernames and passwords appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/20/facebook-scans-paste-sites-leaked-usernames-passwords/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Facebook-scans-paste-sites-for-passwords.jpg
Obama signs federal credit cards security order http://www.welivesecurity.com/2014/10/20/obama-signs-federal-credit-cards-security-order/ http://www.welivesecurity.com/2014/10/20/obama-signs-federal-credit-cards-security-order/#comments Mon, 20 Oct 2014 14:27:42 +0000 Obama signs federal credit cards security order http://www.welivesecurity.com/?p=52907 President Barack Obama has signed an executive order to increase security on federal credit cards, and has urged retailers and banks to do similar to combat identify fraud, reports Reuters.

The post Obama signs federal credit cards security order appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/20/obama-signs-federal-credit-cards-security-order/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Obama-signs-federal-credit-card-security-order.jpg
Botnets: remote controls for cybercriminals http://www.welivesecurity.com/2014/10/20/botnets-remote-controls-cybercriminals/ http://www.welivesecurity.com/2014/10/20/botnets-remote-controls-cybercriminals/#comments Mon, 20 Oct 2014 08:55:44 +0000 Botnets: remote controls for cybercriminals http://www.welivesecurity.com/?p=52147 As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

The post Botnets: remote controls for cybercriminals appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/20/botnets-remote-controls-cybercriminals/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/07/cbotnet-control.jpg
Vulnerable web cams and printers have become DDoS launch platforms http://www.welivesecurity.com/2014/10/17/vulnerable-web-cams-printers-cable-modems-become-ddos-launch-platforms/ http://www.welivesecurity.com/2014/10/17/vulnerable-web-cams-printers-cable-modems-become-ddos-launch-platforms/#comments Fri, 17 Oct 2014 16:05:51 +0000 Vulnerable web cams and printers have become DDoS launch platforms http://www.welivesecurity.com/?p=52833 Over 4 million UPnP devices could be used to assist in distributed denial-of-service (DDoS) attacks, Akamai has warned.

The post Vulnerable web cams and printers have become DDoS launch platforms appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/17/vulnerable-web-cams-printers-cable-modems-become-ddos-launch-platforms/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/DDOS.jpg
A brief history of malware 28 years later http://www.welivesecurity.com/2014/10/17/infographic-brief-history-of-malware/ http://www.welivesecurity.com/2014/10/17/infographic-brief-history-of-malware/#comments Fri, 17 Oct 2014 15:05:46 +0000 A brief history of malware 28 years later http://www.welivesecurity.com/?p=52826 Malware has come a long way since its earliest days, and aided by the rapid development of the internet it's certainly faster spreading than the weeks it took in the days of floppy disk transfer.

The post A brief history of malware 28 years later appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/17/infographic-brief-history-of-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/WLS-virus_FB_28days.jpg
Android Lollipop offers password protection against factory resets http://www.welivesecurity.com/2014/10/17/android-lollipop-offers-password-protection-factory-resets/ http://www.welivesecurity.com/2014/10/17/android-lollipop-offers-password-protection-factory-resets/#comments Fri, 17 Oct 2014 13:19:33 +0000 Android Lollipop offers password protection against factory resets http://www.welivesecurity.com/?p=52801 The latest version of Android, nicknamed Lollipop, will offer a new feature that could make stolen phones a whole lot less valuable to thieves: the ability to only allow factory resets when entering a password.

The post Android Lollipop offers password protection against factory resets appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/17/android-lollipop-offers-password-protection-factory-resets/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Android-killswitch-in-lollipop.jpg
Privacy online – what you can do (and what you can’t) http://www.welivesecurity.com/2014/10/17/privacy-online-online-privacy/ http://www.welivesecurity.com/2014/10/17/privacy-online-online-privacy/#comments Fri, 17 Oct 2014 10:12:05 +0000 Privacy online – what you can do (and what you can’t) http://www.welivesecurity.com/?p=52780 Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.

The post Privacy online – what you can do (and what you can’t) appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/17/privacy-online-online-privacy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/privacidad_internet.jpg
Facebook ‘Safety Check’ allows travelers to alert family http://www.welivesecurity.com/2014/10/16/facebook-safety-check-allows-travelers-alert-family-safety/ http://www.welivesecurity.com/2014/10/16/facebook-safety-check-allows-travelers-alert-family-safety/#comments Thu, 16 Oct 2014 16:44:27 +0000 Facebook ‘Safety Check’ allows travelers to alert family http://www.welivesecurity.com/?p=52762 Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.

The post Facebook ‘Safety Check’ allows travelers to alert family appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/16/facebook-safety-check-allows-travelers-alert-family-safety/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/safetycheckmobielcarousel.jpg
iPad Air 2 – fingerprint security is here to stay http://www.welivesecurity.com/2014/10/16/ipad-air-2-fingerprint-security-stay/ http://www.welivesecurity.com/2014/10/16/ipad-air-2-fingerprint-security-stay/#comments Thu, 16 Oct 2014 15:58:34 +0000 iPad Air 2 – fingerprint security is here to stay http://www.welivesecurity.com/?p=52735 The latest version of the Apple iPad is due to be announced at an event later today, and according to Gizmodo, the Californian tech company are planning on bringing the fingerprint security system implemented in recent iPhones to its tablet market for the first time.

The post iPad Air 2 – fingerprint security is here to stay appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/16/ipad-air-2-fingerprint-security-stay/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/fingerprint-scanning.jpg
Cybercrime statistics offer a glimpse into the underworld http://www.welivesecurity.com/2014/10/16/cybercrime-statistics/ http://www.welivesecurity.com/2014/10/16/cybercrime-statistics/#comments Thu, 16 Oct 2014 15:50:58 +0000 Cybercrime statistics offer a glimpse into the underworld http://www.welivesecurity.com/?p=52737 A crime-reporting survey in Canada has offered a unique insight into how cybercrime affects a large population - and an insight into a grim underworld dominated by fraud, violence and sexual abuse.

The post Cybercrime statistics offer a glimpse into the underworld appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/16/cybercrime-statistics/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/cyberevil.jpg
Chase breach: Stolen personal info brings headaches too http://www.welivesecurity.com/2014/10/16/chase-breach-stolen-personal-info-brings-headaches/ http://www.welivesecurity.com/2014/10/16/chase-breach-stolen-personal-info-brings-headaches/#comments Thu, 16 Oct 2014 00:59:28 +0000 Chase breach: Stolen personal info brings headaches too http://www.welivesecurity.com/?p=52723 On the one hand, the breach of JP Morgan Chase is not as bad as it could have been. But how do you measure relative “badness” of a breach?

The post Chase breach: Stolen personal info brings headaches too appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/16/chase-breach-stolen-personal-info-brings-headaches/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Angry_Call.png
Hungarian soccer fans protest against stadium’s new biometric security http://www.welivesecurity.com/2014/10/15/hungarian-soccer-fans-protest-stadiums-new-biometric-security/ http://www.welivesecurity.com/2014/10/15/hungarian-soccer-fans-protest-stadiums-new-biometric-security/#comments Wed, 15 Oct 2014 16:48:05 +0000 Hungarian soccer fans protest against stadium’s new biometric security http://www.welivesecurity.com/?p=52694 Fans of Hungarian soccer team Ferencvaros have come "en masse to their home stadium in Budapest" to protest the club's new biometric ID equipment, which controls turnstile entry to the stadium, according to Biometric Update.

The post Hungarian soccer fans protest against stadium’s new biometric security appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/15/hungarian-soccer-fans-protest-stadiums-new-biometric-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Ferencvaros-introduce-biometric-ticketing.jpg
POODLE Attack – Google uncovers major flaw in SSL 3.0 http://www.welivesecurity.com/2014/10/15/poodle-attack-google-uncovers-major-flaw-ssl-3-0/ http://www.welivesecurity.com/2014/10/15/poodle-attack-google-uncovers-major-flaw-ssl-3-0/#comments Wed, 15 Oct 2014 14:40:42 +0000 POODLE Attack – Google uncovers major flaw in SSL 3.0 http://www.welivesecurity.com/?p=52663 In an announcement eerily reminiscent of the early phases of the Heartbleed flaw that took internet security by storm earlier in the year, Google has uncovered an exploit that could allow attackers to decode the plaintext traffic of a secure connection.

The post POODLE Attack – Google uncovers major flaw in SSL 3.0 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/15/poodle-attack-google-uncovers-major-flaw-ssl-3-0/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/poodle-security-bug.jpg
October is the Cyber Security Month: stats, events and advice http://www.welivesecurity.com/2014/10/15/october-cyber-security-month-stats-events-advice/ http://www.welivesecurity.com/2014/10/15/october-cyber-security-month-stats-events-advice/#comments Wed, 15 Oct 2014 14:21:46 +0000 October is the Cyber Security Month: stats, events and advice http://www.welivesecurity.com/?p=52598 Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.

The post October is the Cyber Security Month: stats, events and advice appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/15/october-cyber-security-month-stats-events-advice/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/2289377358_ddd270409a_z.jpg
Operation Windigo: “Good job, ESET!” says malware author http://www.welivesecurity.com/2014/10/15/operation-windigo-good-job-eset-says-malware-author/ http://www.welivesecurity.com/2014/10/15/operation-windigo-good-job-eset-says-malware-author/#comments Wed, 15 Oct 2014 12:00:34 +0000 Operation Windigo: “Good job, ESET!” says malware author http://www.welivesecurity.com/?p=52617 Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.

The post Operation Windigo: “Good job, ESET!” says malware author appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/15/operation-windigo-good-job-eset-says-malware-author/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Marc-Etienne_Vert.jpg
$50 Anonabox provides portable privacy via Tor http://www.welivesecurity.com/2014/10/14/50-anonabox-provides-portable-privacy-via-tor/ http://www.welivesecurity.com/2014/10/14/50-anonabox-provides-portable-privacy-via-tor/#comments Tue, 14 Oct 2014 16:39:44 +0000 $50 Anonabox provides portable privacy via Tor http://www.welivesecurity.com/?p=52562 A portable network device that sits between computer and router to offer anonymized browsing from any computer via the Tor network has smashed its Kickstarter fundraising goal just days after hitting the crowdfunding platform.

The post $50 Anonabox provides portable privacy via Tor appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/14/50-anonabox-provides-portable-privacy-via-tor/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Screen-Shot-2014-10-14-at-16.47.00.png
CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns http://www.welivesecurity.com/2014/10/14/cve-2014-4114-details-august-blackenergy-powerpoint-campaigns/ http://www.welivesecurity.com/2014/10/14/cve-2014-4114-details-august-blackenergy-powerpoint-campaigns/#comments Tue, 14 Oct 2014 15:29:13 +0000 CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns http://www.welivesecurity.com/?p=52564 In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.

The post CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/14/cve-2014-4114-details-august-blackenergy-powerpoint-campaigns/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/powerpoint-malware.jpg
Dropbox denies server hack as nearly 7 million account details leak http://www.welivesecurity.com/2014/10/14/dropbox-denies-server-hack-nearly-7-million-account-details-leak/ http://www.welivesecurity.com/2014/10/14/dropbox-denies-server-hack-nearly-7-million-account-details-leak/#comments Tue, 14 Oct 2014 15:06:30 +0000 Dropbox denies server hack as nearly 7 million account details leak http://www.welivesecurity.com/?p=52542 A hacking group has claimed that it has access to 6,937,081 Dropbox accounts with usernames and passwords, according to ZDNet. The first 400 log-in combinations were posted to Pastebin, with more to follow in return for payment in Bitcoin.

The post Dropbox denies server hack as nearly 7 million account details leak appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/14/dropbox-denies-server-hack-nearly-7-million-account-details-leak/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/dropbox.jpg
Kmart hit by malware credit card breach http://www.welivesecurity.com/2014/10/13/kmart-hit-malware-credit-card-breach/ http://www.welivesecurity.com/2014/10/13/kmart-hit-malware-credit-card-breach/#comments Mon, 13 Oct 2014 16:36:18 +0000 Kmart hit by malware credit card breach http://www.welivesecurity.com/?p=52514 Sears Holding Co. is the latest high profile name to announce the discovery of malicious credit and debit card stealing malware in its point of sale registers at its Kmart stores, writes Brian Krebs on his Krebs on Security website.

The post Kmart hit by malware credit card breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/13/kmart-hit-malware-credit-card-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/kmart.jpg
200,000 ‘deleted’ Snapchat images leaked from third party website http://www.welivesecurity.com/2014/10/13/200000-deleted-snapchat-images-leaked-third-party-website/ http://www.welivesecurity.com/2014/10/13/200000-deleted-snapchat-images-leaked-third-party-website/#comments Mon, 13 Oct 2014 14:14:32 +0000 200,000 ‘deleted’ Snapchat images leaked from third party website http://www.welivesecurity.com/?p=52506 A breach of a third-party Snapchat site that allows users to bypass the app's privacy has led to the leaking of some 200,000 images to the internet, The Guardian reports.

The post 200,000 ‘deleted’ Snapchat images leaked from third party website appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/13/200000-deleted-snapchat-images-leaked-third-party-website/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/snapchat.jpg
Week in security: Dubai Police use Google Glass facial recognition, Bugzilla gets bugged and ‘Unpatchable’ USB exploit lands on GitHub http://www.welivesecurity.com/2014/10/10/week-security-dubai-police-use-google-glass-facial-recognition-bugzilla-gets-bugged-unpatchable-usb-exploit-lands-github/ http://www.welivesecurity.com/2014/10/10/week-security-dubai-police-use-google-glass-facial-recognition-bugzilla-gets-bugged-unpatchable-usb-exploit-lands-github/#comments Fri, 10 Oct 2014 16:57:47 +0000 Week in security: Dubai Police use Google Glass facial recognition, Bugzilla gets bugged and ‘Unpatchable’ USB exploit lands on GitHub http://www.welivesecurity.com/?p=52468 This week in security, we covered a full range of privacy and malware, with controversial plans to equip police officers with facial recognition packed Google Glass in Dubai, and the BadUSB malware finding its way on to GitHub.

The post Week in security: Dubai Police use Google Glass facial recognition, Bugzilla gets bugged and ‘Unpatchable’ USB exploit lands on GitHub appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/10/week-security-dubai-police-use-google-glass-facial-recognition-bugzilla-gets-bugged-unpatchable-usb-exploit-lands-github/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/malware.jpg
Dairy Queen hit by card data stealing malware http://www.welivesecurity.com/2014/10/10/dairy-queen-hit-card-data-stealing-malware/ http://www.welivesecurity.com/2014/10/10/dairy-queen-hit-card-data-stealing-malware/#comments Fri, 10 Oct 2014 16:14:18 +0000 Dairy Queen hit by card data stealing malware http://www.welivesecurity.com/?p=52459 Dairy Queen has become the latest company to be hit by payment card stealing malware, reports the Wall Street Journal. The breach is said to have affected 395 of its 4,500 American locations.

The post Dairy Queen hit by card data stealing malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/10/dairy-queen-hit-card-data-stealing-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Dairy-Queen-hacked.jpg
Cyber Security Awareness Month: It’s on! http://www.welivesecurity.com/2014/10/10/national-cyber-security-awareness-month/ http://www.welivesecurity.com/2014/10/10/national-cyber-security-awareness-month/#comments Fri, 10 Oct 2014 11:05:41 +0000 Cyber Security Awareness Month: It’s on! http://www.welivesecurity.com/?p=52365 October is National Cyber Security Awareness Month in America and each year this program brings more and more attention to issues that should be of concern to anyone who uses a computer, plus a low of how-to information, security resources, and awareness-raising events.

The post Cyber Security Awareness Month: It’s on! appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/10/national-cyber-security-awareness-month/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/ncsam-2014.png
Future malware might offer real functions to avoid detection http://www.welivesecurity.com/2014/10/09/future-malware-might-offer-real-functions-avoid-detection/ http://www.welivesecurity.com/2014/10/09/future-malware-might-offer-real-functions-avoid-detection/#comments Thu, 09 Oct 2014 15:45:56 +0000 Future malware might offer real functions to avoid detection http://www.welivesecurity.com/?p=52406 Malware may begin to offer genuinely helpful functionality in the future, in order to "fly under the radar" and fake legitimacy before striking, according to Professor Giovanni Vigna from the University of California.

The post Future malware might offer real functions to avoid detection appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/09/future-malware-might-offer-real-functions-avoid-detection/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/malware-might-behave-for-a-while.jpg
European ATMs under malware attack http://www.welivesecurity.com/2014/10/09/european-atms-malware-attack/ http://www.welivesecurity.com/2014/10/09/european-atms-malware-attack/#comments Thu, 09 Oct 2014 15:02:01 +0000 European ATMs under malware attack http://www.welivesecurity.com/?p=52393 At least 50 cash machines in Eastern Europe have been targeted by malware that allows the hacker to withdraw up to 40 notes at once without a credit or debit card to hand, Computer Weekly reports.

The post European ATMs under malware attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/09/european-atms-malware-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/atm.jpg
Ello privacy – what you need to know http://www.welivesecurity.com/2014/10/09/ello-privacy/ http://www.welivesecurity.com/2014/10/09/ello-privacy/#comments Thu, 09 Oct 2014 13:45:06 +0000 Ello privacy – what you need to know http://www.welivesecurity.com/?p=52236 For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation - we offer a few tips on how to get the most from the emoji-heavy network here.

The post Ello privacy – what you need to know appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/09/ello-privacy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/ello_red_social.png
Previously undiscovered Bugzilla exploit patched http://www.welivesecurity.com/2014/10/08/previously-undiscovered-bugzilla-exploit-patched/ http://www.welivesecurity.com/2014/10/08/previously-undiscovered-bugzilla-exploit-patched/#comments Wed, 08 Oct 2014 14:53:53 +0000 Previously undiscovered Bugzilla exploit patched http://www.welivesecurity.com/?p=52272 Bugzilla, the open source bug reporting and tracking tool used by Mozilla and many popular Linux distributions, has had a potentially damaging security flaw patched, reports Brian Krebs on his Krebs on Security website.

The post Previously undiscovered Bugzilla exploit patched appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/08/previously-undiscovered-bugzilla-exploit-patched/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Mozilla.jpg
Manual fixes to USB malware revealed… with a catch http://www.welivesecurity.com/2014/10/08/manual-fixes-usb-malware-revealed-catch/ http://www.welivesecurity.com/2014/10/08/manual-fixes-usb-malware-revealed-catch/#comments Wed, 08 Oct 2014 12:02:50 +0000 Manual fixes to USB malware revealed… with a catch http://www.welivesecurity.com/?p=52252 Since the BadUSB malware was released to the public with hopes of forcing a fix, a solution has emerged from the researchers who posted the code, but the fix is definitely not without its problems.

The post Manual fixes to USB malware revealed… with a catch appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/08/manual-fixes-usb-malware-revealed-catch/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/USB.jpg
Sednit espionage group now using custom exploit kit http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/ http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/#comments Wed, 08 Oct 2014 08:49:07 +0000 Sednit espionage group now using custom exploit kit http://www.welivesecurity.com/?p=52150 For at least five years the Sednit group has been relentlessly attacking various institutions, most notably in Eastern Europe. The group used several advanced pieces of malware for these targeted attacks, in particular the one we named Win32/Sednit, also known as Sofacy.

The post Sednit espionage group now using custom exploit kit appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/hacker-exploit-kit.jpg
Yahoo told to “pull your pants up” after Shellshock hack claims http://www.welivesecurity.com/2014/10/08/yahoo-hacked-shellshock-vulnerability/ http://www.welivesecurity.com/2014/10/08/yahoo-hacked-shellshock-vulnerability/#comments Wed, 08 Oct 2014 05:32:13 +0000 Yahoo told to “pull your pants up” after Shellshock hack claims http://www.welivesecurity.com/?p=52225 Yesterday, security researcher Jonathan Hall, of a company called Future South Technologies, accused Yahoo of having suffered a serious security breach via the recently discovered Shellshock vulnerability in Bash.

The post Yahoo told to “pull your pants up” after Shellshock hack claims appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/08/yahoo-hacked-shellshock-vulnerability/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/yahoo-pants-down-623x425.jpeg
Google Glass facial recognition used by Dubai Police force http://www.welivesecurity.com/2014/10/07/google-glass-facial-recognition-used-dubai-police-force/ http://www.welivesecurity.com/2014/10/07/google-glass-facial-recognition-used-dubai-police-force/#comments Tue, 07 Oct 2014 16:17:41 +0000 Google Glass facial recognition used by Dubai Police force http://www.welivesecurity.com/?p=52195 The police force of Dubai will soon be equipped with crime-fighting face recognition technology via Google Glass, according to Reuters. The software, "developed by Dubai police would enable a connection between the wearer and a database of wanted people," Reuters reports.

The post Google Glass facial recognition used by Dubai Police force appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/07/google-glass-facial-recognition-used-dubai-police-force/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/google-glass.jpg