We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Tue, 01 Sep 2015 14:02:36 +0000 en-US hourly 1 UK’s National Crime Agency hit by DDoS attack, following LizardStresser arrests http://www.welivesecurity.com/2015/09/01/uk-national-crime-agency-ddos/ http://www.welivesecurity.com/2015/09/01/uk-national-crime-agency-ddos/#comments Tue, 01 Sep 2015 14:01:45 +0000 http://www.welivesecurity.com/?p=68318 Last week, users of Lizard Squad's DDoS-on-demand service were feeling the heat after arrests were made by UK police. This week, it's the UK's National Crime Agency which has found itself the victim of a denial-of-service attack.

The post UK’s National Crime Agency hit by DDoS attack, following LizardStresser arrests appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/09/01/uk-national-crime-agency-ddos/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/09/lizard-squad-featured.jpeg
Wikipedia blocks 381 sockpuppet accounts http://www.welivesecurity.com/2015/09/01/wikipedia-blocks-381-sockpuppet-accounts/ http://www.welivesecurity.com/2015/09/01/wikipedia-blocks-381-sockpuppet-accounts/#comments Tue, 01 Sep 2015 11:40:22 +0000 http://www.welivesecurity.com/?p=68309 Up to 381 sockpuppet accounts have been blocked by Wikipedia because they were engaged in undisclosed paid advocacy.

The post Wikipedia blocks 381 sockpuppet accounts appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/09/01/wikipedia-blocks-381-sockpuppet-accounts/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/09/Wikipedia.jpg
VMworld – Got a ton of VMs? Now what? http://www.welivesecurity.com/2015/09/01/vmworld-got-ton-vms-now/ http://www.welivesecurity.com/2015/09/01/vmworld-got-ton-vms-now/#comments Tue, 01 Sep 2015 09:40:30 +0000 http://www.welivesecurity.com/?p=68299 This year VMworld tackles what happens when your VM farm grows up and spawns hundreds or thousands of baby VMs

The post VMworld – Got a ton of VMs? Now what? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/09/01/vmworld-got-ton-vms-now/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/09/san-francisco.jpg
8 security tips for gamers: go play with no worries! http://www.welivesecurity.com/2015/08/28/8-security-tips-gamers-go-play-no-worries/ http://www.welivesecurity.com/2015/08/28/8-security-tips-gamers-go-play-no-worries/#comments Fri, 28 Aug 2015 15:18:14 +0000 http://www.welivesecurity.com/?p=68201 It is possible to enjoy videogames by applying practical security measures that will keep us safe. In this article, we look at 8 security tips.

The post 8 security tips for gamers: go play with no worries! appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/28/8-security-tips-gamers-go-play-no-worries/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/gamer1.jpg
LizardStresser: Six people arrested in connection with Lizard Squad’s DDoS attack tool http://www.welivesecurity.com/2015/08/28/lizard-stresser-arrests/ http://www.welivesecurity.com/2015/08/28/lizard-stresser-arrests/#comments Fri, 28 Aug 2015 11:42:37 +0000 http://www.welivesecurity.com/?p=68168 British police have today announced the arrest of six people in connection with distributed denial-of-service (DDoS) attacks that attempted to bring down websites belonging to – amongst others – a national newspaper, a school and a number of online retailers.

The post LizardStresser: Six people arrested in connection with Lizard Squad’s DDoS attack tool appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/28/lizard-stresser-arrests/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/lizard-623x425.jpeg
iOS vulnerability Ins0mnia fixed by Apple http://www.welivesecurity.com/2015/08/28/ios-vulnerability-ins0mnia-fixed-apple/ http://www.welivesecurity.com/2015/08/28/ios-vulnerability-ins0mnia-fixed-apple/#comments Fri, 28 Aug 2015 08:00:53 +0000 http://www.welivesecurity.com/?p=68162 Apple has resolved a serious security vulnerability known as Ins0mnia in its latest update.

The post iOS vulnerability Ins0mnia fixed by Apple appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/28/ios-vulnerability-ins0mnia-fixed-apple/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/15415264281_f99cd63d21_z.jpg
Security of Ashley Madison breached sooner that you think http://www.welivesecurity.com/2015/08/27/ashley-madison-timeline-events/ http://www.welivesecurity.com/2015/08/27/ashley-madison-timeline-events/#comments Thu, 27 Aug 2015 16:21:14 +0000 http://www.welivesecurity.com/?p=68128 The Ashley Madison attack could be one of the most notable instances of cybercrime in 2015. Here's a timeline of the key events.

The post Security of Ashley Madison breached sooner that you think appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/27/ashley-madison-timeline-events/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Ashley-Madison.jpg
Support scams, malware and mindgames without frontiers http://www.welivesecurity.com/2015/08/26/support-scams-malware-mindgames-without-frontiers/ http://www.welivesecurity.com/2015/08/26/support-scams-malware-mindgames-without-frontiers/#comments Wed, 26 Aug 2015 15:30:58 +0000 http://www.welivesecurity.com/?p=67802 Introduction It might not have escaped your notice that I write quite a lot about support scams, an issue in which most commentators in the security industry take only sporadic interest and tend to regard as of only niche interest. (As when a scammer is damaging their brand or product in some way, for instance

The post Support scams, malware and mindgames without frontiers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/26/support-scams-malware-mindgames-without-frontiers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/slippery-slope.jpg
Dolphin and Mercury Android browsers have major vulnerabilities http://www.welivesecurity.com/2015/08/26/dolphin-mercury-android-browsers-major-vulnerabilities/ http://www.welivesecurity.com/2015/08/26/dolphin-mercury-android-browsers-major-vulnerabilities/#comments Wed, 26 Aug 2015 13:28:09 +0000 http://www.welivesecurity.com/?p=67998 Dolphin and Mercury Android browsers have major vulnerabilities, allowing for remote code execution and arbitrary reading and writing of files.

The post Dolphin and Mercury Android browsers have major vulnerabilities appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/26/dolphin-mercury-android-browsers-major-vulnerabilities/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/cybercrime.jpg
An Ashley Madison response plan: does your company have one? http://www.welivesecurity.com/2015/08/25/ashley-madison-response-plan/ http://www.welivesecurity.com/2015/08/25/ashley-madison-response-plan/#comments Tue, 25 Aug 2015 16:35:28 +0000 http://www.welivesecurity.com/?p=67882 The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here's what you need to know.

The post An Ashley Madison response plan: does your company have one? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/25/ashley-madison-response-plan/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/ashley-madison-scams.jpg
Windows 95 turns 20: The OS We All Love To Hate http://www.welivesecurity.com/2015/08/25/revolutionary-windows-95-turns-20/ http://www.welivesecurity.com/2015/08/25/revolutionary-windows-95-turns-20/#comments Tue, 25 Aug 2015 16:29:30 +0000 http://www.welivesecurity.com/?p=67946 1995 was a landmark year for technology, the internet and home computing. We can thank Windows 95 for a lot of the perks we find ourselves with today.

The post Windows 95 turns 20: The OS We All Love To Hate appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/25/revolutionary-windows-95-turns-20/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/micro-95.jpg
A big day for consumers: Companies answerable for poor cybersecurity http://www.welivesecurity.com/2015/08/25/ftc-can-punish-organisations-poor-cybersecurity/ http://www.welivesecurity.com/2015/08/25/ftc-can-punish-organisations-poor-cybersecurity/#comments Tue, 25 Aug 2015 12:22:40 +0000 http://www.welivesecurity.com/?p=67892 FTC has the authority to hold organisations to account for failing to deliver tough cybersecurity measures.

The post A big day for consumers: Companies answerable for poor cybersecurity appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/25/ftc-can-punish-organisations-poor-cybersecurity/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/FTC.jpg
Make password into a story and more parental hacks http://www.welivesecurity.com/2015/08/24/make-password-story-parental-hacks/ http://www.welivesecurity.com/2015/08/24/make-password-story-parental-hacks/#comments Mon, 24 Aug 2015 13:00:46 +0000 http://www.welivesecurity.com/?p=67609 It’s important to ensure your child's data and devices are secure at school and at home. Check out our to back to school digital security guide.

The post Make password into a story and more parental hacks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/24/make-password-story-parental-hacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/digital-security.jpg
How does facial recognition technology work? http://www.welivesecurity.com/2015/08/24/facial-recognition-technology-work/ http://www.welivesecurity.com/2015/08/24/facial-recognition-technology-work/#comments Mon, 24 Aug 2015 12:00:23 +0000 http://www.welivesecurity.com/?p=67648 In this hi-tech age, your face is increasingly becoming a digital ID for authenticating who you are online. We look at how facial recognition works.

The post How does facial recognition technology work? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/24/facial-recognition-technology-work/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/facial-recog-1.jpg
Ashley Madison members ‘easy target for extortion’ http://www.welivesecurity.com/2015/08/24/ashley-madison-members-easy-target-extortion/ http://www.welivesecurity.com/2015/08/24/ashley-madison-members-easy-target-extortion/#comments Mon, 24 Aug 2015 11:40:59 +0000 http://www.welivesecurity.com/?p=67816 There is the very real possibility that members of the infidelity website Ashley Madison may be subject to extortion threats.

The post Ashley Madison members ‘easy target for extortion’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/24/ashley-madison-members-easy-target-extortion/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/shutterstock_131308166.jpg
How to nurture your child’s security genius http://www.welivesecurity.com/2015/08/21/nurture-childs-security-genius/ http://www.welivesecurity.com/2015/08/21/nurture-childs-security-genius/#comments Fri, 21 Aug 2015 14:00:40 +0000 http://www.welivesecurity.com/?p=67514 Is your child a security genius? If you think so, here’s what you can do to harness that potential for a career that is exciting and financially lucrative.

The post How to nurture your child’s security genius appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/21/nurture-childs-security-genius/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/computer-genius.jpg
Ambiguous new Windows 10 update ‘improves functionality’ http://www.welivesecurity.com/2015/08/21/ambiguous-new-windows-10-update-improves-functionality/ http://www.welivesecurity.com/2015/08/21/ambiguous-new-windows-10-update-improves-functionality/#comments Fri, 21 Aug 2015 13:00:00 +0000 http://www.welivesecurity.com/?p=67744 The new Windows 10 update doesn’t offer any detail as to what it fixes or improves, leaving many to question why the tech giant has been so vague.

The post Ambiguous new Windows 10 update ‘improves functionality’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/21/ambiguous-new-windows-10-update-improves-functionality/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Windows-101.png
Bundestag computer system goes offline http://www.welivesecurity.com/2015/08/20/bundestag-computer-system-goes-offline/ http://www.welivesecurity.com/2015/08/20/bundestag-computer-system-goes-offline/#comments Thu, 20 Aug 2015 14:49:07 +0000 http://www.welivesecurity.com/?p=67698 The computer system in the Bundestag is now offline, to allow technicians to perform essential maintenance work.

The post Bundestag computer system goes offline appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/20/bundestag-computer-system-goes-offline/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/15042438888_ae48e07042_z.jpg
Nine out of ten parents worry about kids online − yet few act http://www.welivesecurity.com/2015/08/20/parents-worry-online-safety-children/ http://www.welivesecurity.com/2015/08/20/parents-worry-online-safety-children/#comments Thu, 20 Aug 2015 12:00:47 +0000 http://www.welivesecurity.com/?p=67419 The internet is arguably the new frontier for communication, collaboration and business but, with criminals also using it for ill-gotten gains, it does have its bad parts too. And this is making life difficult for parents struggling to keep up with their child’s technology obsession.

The post Nine out of ten parents worry about kids online − yet few act appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/20/parents-worry-online-safety-children/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/child-safety.jpg
Web.com experiences data breach http://www.welivesecurity.com/2015/08/20/web-com-experiences-data-breach/ http://www.welivesecurity.com/2015/08/20/web-com-experiences-data-breach/#comments Thu, 20 Aug 2015 11:50:02 +0000 http://www.welivesecurity.com/?p=67670 Web.com reveals that was the victim of a data breach this month, which affected up to 93,000 of its customers.

The post Web.com experiences data breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/20/web-com-experiences-data-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/04/Credit-Card-Gold-Chip-1182294.jpg
Back to university: cybersecurity now a major concern in higher education http://www.welivesecurity.com/2015/08/19/back-to-school-cybersecurity-higher-education/ http://www.welivesecurity.com/2015/08/19/back-to-school-cybersecurity-higher-education/#comments Wed, 19 Aug 2015 15:01:07 +0000 http://www.welivesecurity.com/?p=67506 Cybersecurity topics and panels were rated one of the “6 Best Things” at the recent Campus Tech conference, in Boston.

The post Back to university: cybersecurity now a major concern in higher education appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/19/back-to-school-cybersecurity-higher-education/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/college-students-computer-class.jpg
Impact Team releases stolen Ashley Madison data online http://www.welivesecurity.com/2015/08/19/impact-team-releases-stolen-ashley-madison-data-online/ http://www.welivesecurity.com/2015/08/19/impact-team-releases-stolen-ashley-madison-data-online/#comments Wed, 19 Aug 2015 14:27:31 +0000 http://www.welivesecurity.com/?p=67581 The Impact Team have released stolen Ashley Madison data on the dark web, which includes personal information belonging to 37 million users of the website.

The post Impact Team releases stolen Ashley Madison data online appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/19/impact-team-releases-stolen-ashley-madison-data-online/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/cheating-online-1.jpg
MumsNet hit by hack, DDoS attack and SWAT http://www.welivesecurity.com/2015/08/19/mumsnet-hack-ddos-swat/ http://www.welivesecurity.com/2015/08/19/mumsnet-hack-ddos-swat/#comments Wed, 19 Aug 2015 13:07:06 +0000 http://www.welivesecurity.com/?p=67561 Mumsnet, the phenomenally popular British parenting website, has suffered an attack from hackers which has seen users' accounts breached, and passwords stolen. And the damage doesn't end there...

The post MumsNet hit by hack, DDoS attack and SWAT appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/19/mumsnet-hack-ddos-swat/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/mumsnet-623x425.jpeg
Car security vulnerability study finally sees light of day http://www.welivesecurity.com/2015/08/19/car-security-vulnerability-study-finally-sees-light-day/ http://www.welivesecurity.com/2015/08/19/car-security-vulnerability-study-finally-sees-light-day/#comments Wed, 19 Aug 2015 09:59:53 +0000 http://www.welivesecurity.com/?p=67535 A major security vulnerability study into modern cars has finally been released, two years after it was originally intended to be published.

The post Car security vulnerability study finally sees light of day appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/19/car-security-vulnerability-study-finally-sees-light-day/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Car-hack.jpg
Your kids online: 5 ways to keep them out of harm’s way http://www.welivesecurity.com/2015/08/19/back-school-5-challenges-parents-teachers-face-security/ http://www.welivesecurity.com/2015/08/19/back-school-5-challenges-parents-teachers-face-security/#comments Wed, 19 Aug 2015 08:01:05 +0000 http://www.welivesecurity.com/?p=64333 With children gradually going back to school in Latin American regions, it’s time to remind our children of the importance of IT security.

The post Your kids online: 5 ways to keep them out of harm’s way appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/19/back-school-5-challenges-parents-teachers-face-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/02/post-Cami-WLS.jpg
IRS data breach more severe than originally thought http://www.welivesecurity.com/2015/08/18/irs-data-breach-severe-originally-thought/ http://www.welivesecurity.com/2015/08/18/irs-data-breach-severe-originally-thought/#comments Tue, 18 Aug 2015 11:53:51 +0000 http://www.welivesecurity.com/?p=67470 IRS admits that the data breach it experienced in May is far bigger than previously thought.

The post IRS data breach more severe than originally thought appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/18/irs-data-breach-severe-originally-thought/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/IRS.jpg
Phishing unravelled http://www.welivesecurity.com/2015/08/18/phishing-unravelled/ http://www.welivesecurity.com/2015/08/18/phishing-unravelled/#comments Tue, 18 Aug 2015 11:41:37 +0000 http://www.welivesecurity.com/?p=67435 Phishing may well be one of the oldest online scams in the world, but it’s also one of the most effective and commonly deployed. Here’s what to be aware of.

The post Phishing unravelled appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/18/phishing-unravelled/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/phishing.jpg
NICE news about the cybersecurity skills shortage (and a call for papers) http://www.welivesecurity.com/2015/08/18/nice-cybersecurity-conference-2015/ http://www.welivesecurity.com/2015/08/18/nice-cybersecurity-conference-2015/#comments Tue, 18 Aug 2015 08:44:33 +0000 http://www.welivesecurity.com/?p=67176 The cybersecurity skills gap is a security problem and in the US the National Initiative For Cybersecurity Education (NICE) is seeking to reduce that gap.

The post NICE news about the cybersecurity skills shortage (and a call for papers) appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/18/nice-cybersecurity-conference-2015/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/nice-2015-map.png
Lenovo disables ‘unremovable software’ http://www.welivesecurity.com/2015/08/17/lenovo-disables-unremovable-software/ http://www.welivesecurity.com/2015/08/17/lenovo-disables-unremovable-software/#comments Mon, 17 Aug 2015 13:49:35 +0000 http://www.welivesecurity.com/?p=67405 Lenovo has announced that LSE,a virtually unremovable software, is no longer being installed on its products.

The post Lenovo disables ‘unremovable software’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/17/lenovo-disables-unremovable-software/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Lenovo.jpg
BitTorrent family susceptible to DRDoS attacks http://www.welivesecurity.com/2015/08/17/bittorrent-family-susceptible-drdos-attacks/ http://www.welivesecurity.com/2015/08/17/bittorrent-family-susceptible-drdos-attacks/#comments Mon, 17 Aug 2015 11:16:48 +0000 http://www.welivesecurity.com/?p=67387 A new study shows that applications belonging to the BitTorrent family are vulnerable to DRDoS attacks.

The post BitTorrent family susceptible to DRDoS attacks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/17/bittorrent-family-susceptible-drdos-attacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/DDoS-623x4101.jpg
Apple releases major security updates http://www.welivesecurity.com/2015/08/14/apple-releases-major-security-updates/ http://www.welivesecurity.com/2015/08/14/apple-releases-major-security-updates/#comments Fri, 14 Aug 2015 16:26:22 +0000 http://www.welivesecurity.com/?p=67319 Significant issues evident in Apple products have been patched with a raft of new updates.

The post Apple releases major security updates appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/14/apple-releases-major-security-updates/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Mac_actualizacion.jpg
Are you still vulnerable to Stagefright? Get your Android device checked now http://www.welivesecurity.com/2015/08/14/still-vulnerable-stagefright-get-android-device-checked/ http://www.welivesecurity.com/2015/08/14/still-vulnerable-stagefright-get-android-device-checked/#comments Fri, 14 Aug 2015 15:35:15 +0000 http://www.welivesecurity.com/?p=67326 Security researchers found a vulnerability in Android that could allow attackers to steal information from smartphones through remotely executed code via a crafted MMS. According to them up to 950 million devices could be vulnerable.

The post Are you still vulnerable to Stagefright? Get your Android device checked now appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/14/still-vulnerable-stagefright-get-android-device-checked/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/android_stagefright.jpg
Signatures, product testing, and the lingering death of AV http://www.welivesecurity.com/2015/08/14/signatures-product-testing-lingering-death-av/ http://www.welivesecurity.com/2015/08/14/signatures-product-testing-lingering-death-av/#comments Fri, 14 Aug 2015 13:00:00 +0000 http://www.welivesecurity.com/?p=67236 Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.

The post Signatures, product testing, and the lingering death of AV appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/14/signatures-product-testing-lingering-death-av/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/graveyard.jpg
How to stop pervy pics popping up on your iPhone http://www.welivesecurity.com/2015/08/13/stop-pervy-pics-popping-iphone/ http://www.welivesecurity.com/2015/08/13/stop-pervy-pics-popping-iphone/#comments Thu, 13 Aug 2015 12:55:07 +0000 http://www.welivesecurity.com/?p=67266 Don't be cyber-flashed by a pervert. Make sure that your iOS device's AirDrop settings are configured properly to protect your eyes from unpleasantness.

The post How to stop pervy pics popping up on your iPhone appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/13/stop-pervy-pics-popping-iphone/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/airdrop-edi.jpeg
Researchers win Internet Defense Prize for C++ detection tool http://www.welivesecurity.com/2015/08/13/researchers-win-internet-defense-prize-c-detection-tool/ http://www.welivesecurity.com/2015/08/13/researchers-win-internet-defense-prize-c-detection-tool/#comments Thu, 13 Aug 2015 12:30:36 +0000 http://www.welivesecurity.com/?p=67271 Internet Defense Prize goes to researchers from the Georgia Institute of Technology for designing a tool that detects a new class of C++ vulnerabilities.

The post Researchers win Internet Defense Prize for C++ detection tool appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/13/researchers-win-internet-defense-prize-c-detection-tool/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Internet-Defense.jpg
Corvette hacked with a text message http://www.welivesecurity.com/2015/08/12/corvette-hacked-text-message/ http://www.welivesecurity.com/2015/08/12/corvette-hacked-text-message/#comments Wed, 12 Aug 2015 16:18:46 +0000 http://www.welivesecurity.com/?p=67244 Researchers have hacked into a Corvette with a simple text message, taking control over its brakes.

The post Corvette hacked with a text message appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/12/corvette-hacked-text-message/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/corvette.jpg
Cybercriminals and traders charged with $100m ‘newswire fraud’ http://www.welivesecurity.com/2015/08/12/hackers-traders-charged-100m-newswire-fraud/ http://www.welivesecurity.com/2015/08/12/hackers-traders-charged-100m-newswire-fraud/#comments Wed, 12 Aug 2015 13:06:13 +0000 http://www.welivesecurity.com/?p=67212 An international team of hackers and traders who benefited from illegal pre-publication access to company finance updates have been charged with fraud.

The post Cybercriminals and traders charged with $100m ‘newswire fraud’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/12/hackers-traders-charged-100m-newswire-fraud/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Newswire-finances.jpg
Facebook data security loophole ‘needs to be fixed’ http://www.welivesecurity.com/2015/08/11/facebook-data-security-loophole-needs-fixed/ http://www.welivesecurity.com/2015/08/11/facebook-data-security-loophole-needs-fixed/#comments Tue, 11 Aug 2015 12:05:28 +0000 http://www.welivesecurity.com/?p=67105 A data security loophole discovered in Facebook needs to be fixed, according to a software engineer.

The post Facebook data security loophole ‘needs to be fixed’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/11/facebook-data-security-loophole-needs-fixed/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Facebook-loophole-623x4101.jpg
5 child geniuses destined for a career in cybersecurity http://www.welivesecurity.com/2015/08/11/6-child-geniuses-destined-career-cybersecurity/ http://www.welivesecurity.com/2015/08/11/6-child-geniuses-destined-career-cybersecurity/#comments Tue, 11 Aug 2015 12:00:04 +0000 http://www.welivesecurity.com/?p=66879 There is a huge shortage of skilled professionals in cybersecurity. We take a look at five young geniuses who may be the future of the industry.

The post 5 child geniuses destined for a career in cybersecurity appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/11/6-child-geniuses-destined-career-cybersecurity/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/chicos_hacker.jpg
Firefox Under Fire: Anatomy of latest 0-day attack http://www.welivesecurity.com/2015/08/11/firefox-under-fire-anatomy-of-latest-0-day-attack/ http://www.welivesecurity.com/2015/08/11/firefox-under-fire-anatomy-of-latest-0-day-attack/#comments Tue, 11 Aug 2015 12:00:01 +0000 http://www.welivesecurity.com/?p=67113 The recent Firefox attacks are an example of active in-the-wild exploitation of a serious software vulnerability.

The post Firefox Under Fire: Anatomy of latest 0-day attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/11/firefox-under-fire-anatomy-of-latest-0-day-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/firefox1-623x4101.jpg
Glasses that ‘block’ facial recognition technology to launch in 2016 http://www.welivesecurity.com/2015/08/10/glasses-block-facial-recognition-technology-launch-2016/ http://www.welivesecurity.com/2015/08/10/glasses-block-facial-recognition-technology-launch-2016/#comments Mon, 10 Aug 2015 16:09:37 +0000 http://www.welivesecurity.com/?p=67081 Glasses that are capable of blocking facial recognition technology are to go on sale in Japan next year.

The post Glasses that ‘block’ facial recognition technology to launch in 2016 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/10/glasses-block-facial-recognition-technology-launch-2016/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Privacy-Visor-623x4101.png
ICO investigating major data breach at Carphone Warehouse in the UK http://www.welivesecurity.com/2015/08/10/ico-investigating-major-data-breach-carphone-warehouse-uk/ http://www.welivesecurity.com/2015/08/10/ico-investigating-major-data-breach-carphone-warehouse-uk/#comments Mon, 10 Aug 2015 12:57:10 +0000 http://www.welivesecurity.com/?p=67064 The Information Commissioner's Office is “making enquiries” into a major data breach at Carphone Warehouse in the UK.

The post ICO investigating major data breach at Carphone Warehouse in the UK appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/10/ico-investigating-major-data-breach-carphone-warehouse-uk/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Carphone-Warehouse.jpg
DEF CON – Upgrading your mom’s basement http://www.welivesecurity.com/2015/08/10/def-con-upgrading-moms-basement/ http://www.welivesecurity.com/2015/08/10/def-con-upgrading-moms-basement/#comments Mon, 10 Aug 2015 09:19:36 +0000 http://www.welivesecurity.com/?p=67046 If Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the new DEF CON. This year it got some Ikea furniture to spruce up its mom’s basement. Not totally commercial, but definitely more – first apartment folding furniture – chic; the basement just got upgraded.

The post DEF CON – Upgrading your mom’s basement appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/10/def-con-upgrading-moms-basement/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/2669139341_65962db3b0_b.jpg
Universal remote can ‘hack into any car’ http://www.welivesecurity.com/2015/08/07/universal-remote-can-hack-car/ http://www.welivesecurity.com/2015/08/07/universal-remote-can-hack-car/#comments Fri, 07 Aug 2015 15:02:31 +0000 http://www.welivesecurity.com/?p=67014 A hacker has developed a device that is capable of hacking into most modern cars by bypassing the rolling code security system.

The post Universal remote can ‘hack into any car’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/07/universal-remote-can-hack-car/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/car-lock-623x4101.jpg
Black Hat 2015 – Threats hit the road http://www.welivesecurity.com/2015/08/07/black-hat-2015-threats-hit-road/ http://www.welivesecurity.com/2015/08/07/black-hat-2015-threats-hit-road/#comments Fri, 07 Aug 2015 10:46:14 +0000 http://www.welivesecurity.com/?p=66973 This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.

The post Black Hat 2015 – Threats hit the road appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/07/black-hat-2015-threats-hit-road/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/threats-road.jpg
20,000 NHS Wales PCs still running Windows XP from beyond the grave http://www.welivesecurity.com/2015/08/07/nhs-wales-windows-xp/ http://www.welivesecurity.com/2015/08/07/nhs-wales-windows-xp/#comments Fri, 07 Aug 2015 10:08:22 +0000 http://www.welivesecurity.com/?p=66976 An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.

Is that really an appropriate level of security for computers that could be holding patients' medical information?

The post 20,000 NHS Wales PCs still running Windows XP from beyond the grave appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/07/nhs-wales-windows-xp/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/xp-623x425.jpeg
How’s Black Hat in 2015? It grows up (and leaves mom’s basement) http://www.welivesecurity.com/2015/08/06/hows-black-hat-2015-grows-leaves-moms-basement/ http://www.welivesecurity.com/2015/08/06/hows-black-hat-2015-grows-leaves-moms-basement/#comments Thu, 06 Aug 2015 14:27:50 +0000 http://www.welivesecurity.com/?p=66897 Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining security to the CEO. A few succeeded in this new role, but enough to convince the execs that if something bad happens in IT, it happens to the execs shortly thereafter.

The post How’s Black Hat in 2015? It grows up (and leaves mom’s basement) appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/06/hows-black-hat-2015-grows-leaves-moms-basement/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/black-hat-usa-2015.jpg
Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft’s new OS http://www.welivesecurity.com/2015/08/06/windows-10-privacy-0/ http://www.welivesecurity.com/2015/08/06/windows-10-privacy-0/#comments Thu, 06 Aug 2015 12:31:08 +0000 http://www.welivesecurity.com/?p=66815 Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.

The post Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft’s new OS appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/06/windows-10-privacy-0/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Windows-10-623x43211.png
WordPress releases latest update with 4.2.4 http://www.welivesecurity.com/2015/08/06/wordpress-releases-latest-update-4-2-4/ http://www.welivesecurity.com/2015/08/06/wordpress-releases-latest-update-4-2-4/#comments Thu, 06 Aug 2015 12:30:40 +0000 http://www.welivesecurity.com/?p=66911 Wordpress has announced its latest update, urging all users to download version 4.2.4 immediately.

The post WordPress releases latest update with 4.2.4 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/06/wordpress-releases-latest-update-4-2-4/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/update-wordpress-623x4101.jpg
Terracotta VPN network helps hackers remain anonymous http://www.welivesecurity.com/2015/08/05/terracotta-vpn-network-helps-hackers-remain-anonymous/ http://www.welivesecurity.com/2015/08/05/terracotta-vpn-network-helps-hackers-remain-anonymous/#comments Wed, 05 Aug 2015 13:23:13 +0000 http://www.welivesecurity.com/?p=66843 Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.

The post Terracotta VPN network helps hackers remain anonymous appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/05/terracotta-vpn-network-helps-hackers-remain-anonymous/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/terracotta.jpg