We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Mon, 02 Mar 2015 12:37:51 +0000 en-US hourly 1 Blu-ray exploits could allow computer malware infection http://www.welivesecurity.com/2015/03/02/blu-ray-exploits-allow-computer-malware-infection/ http://www.welivesecurity.com/2015/03/02/blu-ray-exploits-allow-computer-malware-infection/#comments Mon, 02 Mar 2015 12:37:51 +0000 http://www.welivesecurity.com/?p=59059 A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

The post Blu-ray exploits could allow computer malware infection appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/02/blu-ray-exploits-allow-computer-malware-infection/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/blu-ray-security-exploit.jpg
Tinder – Top 5 security tips http://www.welivesecurity.com/videos/tinder-top-5-security-tips/ http://www.welivesecurity.com/videos/tinder-top-5-security-tips/#comments Fri, 27 Feb 2015 14:08:22 +0000 http://www.welivesecurity.com/?post_type=post_video&p=58922 Digital dating has become more popular than ever because of apps like Tinder, but it’s not without risks. Stay safe by remembering the following tips.

The post Tinder – Top 5 security tips appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/tinder-top-5-security-tips/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/034.jpg
Facebook rewards ‘white hat’ hackers with $1.3m bounty http://www.welivesecurity.com/2015/02/27/facebook-rewards-white-hat-hackers-1-3m-bounty/ http://www.welivesecurity.com/2015/02/27/facebook-rewards-white-hat-hackers-1-3m-bounty/#comments Fri, 27 Feb 2015 12:58:12 +0000 http://www.welivesecurity.com/?p=59000 Facebook has announced that it paid out $1.3 million last year to 'white hat' hackers, as part of a bounty initiative that rewards developers for spotting flaws in the social network.

The post Facebook rewards ‘white hat’ hackers with $1.3m bounty appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/27/facebook-rewards-white-hat-hackers-1-3m-bounty/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Facebook-abre-enlace-Tor.jpg
Exploits: What are they and how do they work? http://www.welivesecurity.com/2015/02/27/exploits-work/ http://www.welivesecurity.com/2015/02/27/exploits-work/#comments Fri, 27 Feb 2015 12:42:50 +0000 http://www.welivesecurity.com/?p=58999 What is an exploit and why are they important?

The post Exploits: What are they and how do they work? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/27/exploits-work/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/exploits-623x427.jpg
Phishing, exploits and botnets – how can they affect your business? http://www.welivesecurity.com/2015/02/26/phishing-exploits-botnets-can-affect-business/ http://www.welivesecurity.com/2015/02/26/phishing-exploits-botnets-can-affect-business/#comments Thu, 26 Feb 2015 17:37:14 +0000 http://www.welivesecurity.com/?p=58989 How can phishing exploits and botnets affect a business?

The post Phishing, exploits and botnets – how can they affect your business? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/26/phishing-exploits-botnets-can-affect-business/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/phishing_exploit_botnets.jpg
WhatsApp – Top 5 security tips http://www.welivesecurity.com/videos/whatsapp-top-5-security-tips/ http://www.welivesecurity.com/videos/whatsapp-top-5-security-tips/#comments Thu, 26 Feb 2015 14:00:15 +0000 http://www.welivesecurity.com/?post_type=post_video&p=58913 WhatsApp is one of the most popular instant message apps in the world, but it’s not without security risks. Avoid the dangers with these 5 top tips.

The post WhatsApp – Top 5 security tips appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/whatsapp-top-5-security-tips/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/035.jpg
Europol shuts down Ramnit botnet used to steal bank details http://www.welivesecurity.com/2015/02/26/europol-shuts-ramnit-botnet-used-steal-bank-details/ http://www.welivesecurity.com/2015/02/26/europol-shuts-ramnit-botnet-used-steal-bank-details/#comments Thu, 26 Feb 2015 12:37:38 +0000 http://www.welivesecurity.com/?p=58956 The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

The post Europol shuts down Ramnit botnet used to steal bank details appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/26/europol-shuts-ramnit-botnet-used-steal-bank-details/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Europol_Ramnit-Botnet.jpg
Lenovo website hacked, Lizard Squad claims responsibility http://www.welivesecurity.com/2015/02/26/lenovo-website-hacked-lizard-squad-claims-responsibility/ http://www.welivesecurity.com/2015/02/26/lenovo-website-hacked-lizard-squad-claims-responsibility/#comments Thu, 26 Feb 2015 11:41:11 +0000 http://www.welivesecurity.com/?p=58957 Chinese computer manufacturer Lenovo has been victim to a website hack, with Lizard Squad claiming responsibility.

The post Lenovo website hacked, Lizard Squad claims responsibility appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/26/lenovo-website-hacked-lizard-squad-claims-responsibility/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/lenovo.jpg
FBI puts $3m bounty on Russian hacker http://www.welivesecurity.com/2015/02/25/fbi-puts-3m-bounty-russian-hacker/ http://www.welivesecurity.com/2015/02/25/fbi-puts-3m-bounty-russian-hacker/#comments Wed, 25 Feb 2015 17:18:54 +0000 http://www.welivesecurity.com/?p=58930 The FBI has offered a record $3 million reward for information leading to the arrest of a cybercriminal, reports the BBC.

The post FBI puts $3m bounty on Russian hacker appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/25/fbi-puts-3m-bounty-russian-hacker/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/09/fbi-wanted-cyber-criminals.png
Top 5 security resolutions for 2015 http://www.welivesecurity.com/videos/top-5-security-resolutions-2015/ http://www.welivesecurity.com/videos/top-5-security-resolutions-2015/#comments Wed, 25 Feb 2015 14:00:14 +0000 http://www.welivesecurity.com/?post_type=post_video&p=58906 Follow these top 5 security resolutions from We Live Security to make for a safer 2015.

The post Top 5 security resolutions for 2015 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/top-5-security-resolutions-2015/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/024.jpg
Nine bad botnets and the damage they did http://www.welivesecurity.com/2015/02/25/nine-bad-botnets-damage/ http://www.welivesecurity.com/2015/02/25/nine-bad-botnets-damage/#comments Wed, 25 Feb 2015 13:27:06 +0000 http://www.welivesecurity.com/?p=58621 Responsible for a great deal of the hacking, spamming and malware every day: here are some of the worst botnets of all time.

The post Nine bad botnets and the damage they did appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/25/nine-bad-botnets-damage/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/01/Botnets.jpg
Anthem hack puts at least 8.8 million NON-customers at risk http://www.welivesecurity.com/2015/02/25/non-anthem-data-breach/ http://www.welivesecurity.com/2015/02/25/non-anthem-data-breach/#comments Wed, 25 Feb 2015 11:48:05 +0000 http://www.welivesecurity.com/?p=58887 Even if you're not a customer of health insurer Anthem, your data could have been put at risk. Be on your guard.

The post Anthem hack puts at least 8.8 million NON-customers at risk appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/25/non-anthem-data-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/anthem-wide.jpeg
Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP http://www.welivesecurity.com/2015/02/25/top-10-breaches-2014-attacked-old-vulnerabilities-says-hp/ http://www.welivesecurity.com/2015/02/25/top-10-breaches-2014-attacked-old-vulnerabilities-says-hp/#comments Wed, 25 Feb 2015 09:06:59 +0000 http://www.welivesecurity.com/?p=58865 A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.

The post Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/25/top-10-breaches-2014-attacked-old-vulnerabilities-says-hp/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/HP-Bericht_Schwachstellen.jpg
British hacker due for sentencing over public service DDoS attacks http://www.welivesecurity.com/2015/02/24/british-hacker-due-sentencing-public-service-ddos-attacks/ http://www.welivesecurity.com/2015/02/24/british-hacker-due-sentencing-public-service-ddos-attacks/#comments Tue, 24 Feb 2015 13:17:13 +0000 http://www.welivesecurity.com/?p=58843 A 51 year old man is facing a lengthy prison sentence in the United Kingdom after admitting to a series of distributed denial of service attacks against social housing, social services and crime prevention websites.

The post British hacker due for sentencing over public service DDoS attacks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/24/british-hacker-due-sentencing-public-service-ddos-attacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/DDOS.jpg
Burning Man queue jumping hackers caught out http://www.welivesecurity.com/2015/02/24/burning-man-queue-jumping-hackers-caught/ http://www.welivesecurity.com/2015/02/24/burning-man-queue-jumping-hackers-caught/#comments Tue, 24 Feb 2015 12:39:01 +0000 http://www.welivesecurity.com/?p=58839 The online queuing system for the 40,000 tickets to the Burning Man festival was hacked by 200 people accessing a 'technical backdoor' to virtually queue jump, according to Computer World.

The post Burning Man queue jumping hackers caught out appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/24/burning-man-queue-jumping-hackers-caught/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/burning-man-festival-ticket-hackers.jpg
Kris Jenner reveals naked video could be leaked in iCloud hack http://www.welivesecurity.com/2015/02/23/kris-jenner-naked-video-leaked-icloud-hack/ http://www.welivesecurity.com/2015/02/23/kris-jenner-naked-video-leaked-icloud-hack/#comments Mon, 23 Feb 2015 12:54:46 +0000 http://www.welivesecurity.com/?p=58780 Kris Jenner is reportedly being blackmailed over a naked video that was stolen from her iCloud and could be released in the public sphere.

The post Kris Jenner reveals naked video could be leaked in iCloud hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/23/kris-jenner-naked-video-leaked-icloud-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/kris-jener-hacked-photo.jpg
What is a botnet? http://www.welivesecurity.com/videos/botnet/ http://www.welivesecurity.com/videos/botnet/#comments Mon, 23 Feb 2015 11:09:48 +0000 http://www.welivesecurity.com/?post_type=post_video&p=58770 What is a botnet, and what can you do to prevent your computer becoming part of one?

The post What is a botnet? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/botnet/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/017.jpg
Say What? Required contents of notice in data breach notifications http://www.welivesecurity.com/2015/02/21/required-contents-of-notice-data-breach-notification/ http://www.welivesecurity.com/2015/02/21/required-contents-of-notice-data-breach-notification/#comments Sat, 21 Feb 2015 09:29:27 +0000 http://www.welivesecurity.com/?p=58617 With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver useful, readable content, other than a general warning to remain vigilant?

The post Say What? Required contents of notice in data breach notifications appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/21/required-contents-of-notice-data-breach-notification/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/notice-to-remain-vigilant.png
Lenovo and Superfish? Don’t panic, you may not be affected http://www.welivesecurity.com/2015/02/20/lenovo-superfish-dont-panic-may-affected/ http://www.welivesecurity.com/2015/02/20/lenovo-superfish-dont-panic-may-affected/#comments Fri, 20 Feb 2015 19:45:47 +0000 http://www.welivesecurity.com/?p=58747 Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

The post Lenovo and Superfish? Don’t panic, you may not be affected appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/20/lenovo-superfish-dont-panic-may-affected/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Superfish_Lenovo1.png
Lenovo apologizes over pre-installed tracking software http://www.welivesecurity.com/2015/02/20/lenovo-apologizes-pre-installed-tracking-software/ http://www.welivesecurity.com/2015/02/20/lenovo-apologizes-pre-installed-tracking-software/#comments Fri, 20 Feb 2015 19:07:55 +0000 http://www.welivesecurity.com/?p=58680 Lenovo has issued a public apology, admitting it "messed up badly" by selling laptops with a controversial tracking software pre-installed.

The post Lenovo apologizes over pre-installed tracking software appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/20/lenovo-apologizes-pre-installed-tracking-software/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/laptop-software-superfish-tracking-software.jpg
Jamie Oliver website serves up a side of malware http://www.welivesecurity.com/2015/02/19/jamie-oliver-website-serves-side-malware/ http://www.welivesecurity.com/2015/02/19/jamie-oliver-website-serves-side-malware/#comments Thu, 19 Feb 2015 15:55:07 +0000 http://www.welivesecurity.com/?p=58635 Jamie Oliver's website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.

The post Jamie Oliver website serves up a side of malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/19/jamie-oliver-website-serves-side-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Jamie-Oliver-website-hacked.jpg
Hacker puts words into wrestler’s mouth in WWE Twitter hack http://www.welivesecurity.com/2015/02/18/hacker-puts-words-wrestlers-mouth-wwe-twitter-hack/ http://www.welivesecurity.com/2015/02/18/hacker-puts-words-wrestlers-mouth-wwe-twitter-hack/#comments Wed, 18 Feb 2015 13:16:47 +0000 http://www.welivesecurity.com/?p=58575 WWE superstar Antonio Cesaro was the victim of a Twitter hack this week, as a wrestling fanatic hacked his account to vent against company chairman and CEO Vince McMahon.

The post Hacker puts words into wrestler’s mouth in WWE Twitter hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/18/hacker-puts-words-wrestlers-mouth-wwe-twitter-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/wwe-wrestling-hack-vince-cesaro.jpg
12,000 exposed to possible ID theft after Jeb Bush publishes emails http://www.welivesecurity.com/2015/02/18/12000-exposed-possible-id-theft-jeb-bush-publishes-emails/ http://www.welivesecurity.com/2015/02/18/12000-exposed-possible-id-theft-jeb-bush-publishes-emails/#comments Wed, 18 Feb 2015 13:12:43 +0000 http://www.welivesecurity.com/?p=58589 Possible 2016 Republican presidential candidate Jeb Bush has has had to retroactively redact over 12,000 personal details from emails published in the name of transparency

The post 12,000 exposed to possible ID theft after Jeb Bush publishes emails appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/18/12000-exposed-possible-id-theft-jeb-bush-publishes-emails/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Jeb-Bush.jpg
Did GCHQ illegally spy on you? Here’s how to find out http://www.welivesecurity.com/2015/02/17/gchq-illegally-spy/ http://www.welivesecurity.com/2015/02/17/gchq-illegally-spy/#comments Tue, 17 Feb 2015 17:07:40 +0000 http://www.welivesecurity.com/?p=58555 Law enforcement agencies shouldn't be above the law.

Find out if the UK's GCHQ illegally spied on you...

The post Did GCHQ illegally spy on you? Here’s how to find out appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/17/gchq-illegally-spy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/top-secret-623x425.jpeg
Google’s Project Zero extends 90 day exploit disclosure deadline http://www.welivesecurity.com/2015/02/17/googles-project-zero-extends-90-day-exploit-disclosure-deadline/ http://www.welivesecurity.com/2015/02/17/googles-project-zero-extends-90-day-exploit-disclosure-deadline/#comments Tue, 17 Feb 2015 14:08:55 +0000 http://www.welivesecurity.com/?p=58551 Google has extended the disclosure period for vulnerabilities uncovered in its Project Zero program by an additional two weeks, if a vendor is planning a patch in the two weeks following the deadline.

The post Google’s Project Zero extends 90 day exploit disclosure deadline appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/17/googles-project-zero-extends-90-day-exploit-disclosure-deadline/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Google-logo.jpg
Russia seeks VPN and Tor ban in anonymity clamp down http://www.welivesecurity.com/2015/02/16/russia-seeks-vpn-tor-ban-anonymity-clamp/ http://www.welivesecurity.com/2015/02/16/russia-seeks-vpn-tor-ban-anonymity-clamp/#comments Mon, 16 Feb 2015 17:39:59 +0000 http://www.welivesecurity.com/?p=58508 Russian authorities have indicated that VPNs and online anonymising software Tor could soon be banned for the country's 143.5 million residents.

The post Russia seeks VPN and Tor ban in anonymity clamp down appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/16/russia-seeks-vpn-tor-ban-anonymity-clamp/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/russia-VPN-tor.jpg
Internet of Things: a Security Timebomb? http://www.welivesecurity.com/2015/02/16/internet-things-security-timebomb/ http://www.welivesecurity.com/2015/02/16/internet-things-security-timebomb/#comments Mon, 16 Feb 2015 15:20:07 +0000 http://www.welivesecurity.com/?p=58504 Hailed as a panacea by those for whom the world cannot move quickly enough, the Internet of Things has been a long time coming. But is Internet of Things security up to scratch?

The post Internet of Things: a Security Timebomb? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/16/internet-things-security-timebomb/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/01/internet-of-things_Fotor.jpg
Sexy Russian scammers would love to break your heart this Valentine’s Day http://www.welivesecurity.com/2015/02/13/sexy-scammers-valentine/ http://www.welivesecurity.com/2015/02/13/sexy-scammers-valentine/#comments Fri, 13 Feb 2015 17:36:36 +0000 http://www.welivesecurity.com/?p=58472 That message you received from a sexy Russian lady calling you Mr Dependable? Sorry to burst your bubble, but it's too good to be true.

The post Sexy Russian scammers would love to break your heart this Valentine’s Day appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/13/sexy-scammers-valentine/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/sofa-heart-wide.jpeg
Facebook exploit allowed attackers to remotely delete photos http://www.welivesecurity.com/2015/02/13/facebook-exploit-allowed-attackers-remotely-delete-photos/ http://www.welivesecurity.com/2015/02/13/facebook-exploit-allowed-attackers-remotely-delete-photos/#comments Fri, 13 Feb 2015 14:05:43 +0000 http://www.welivesecurity.com/?p=58464 A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.

The post Facebook exploit allowed attackers to remotely delete photos appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/13/facebook-exploit-allowed-attackers-remotely-delete-photos/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Facebook-abre-enlace-Tor.jpg
7 unromantic Valentines gifts from a cybercriminal http://www.welivesecurity.com/2015/02/13/7-unromantic-valentines-gifts-cybercriminal/ http://www.welivesecurity.com/2015/02/13/7-unromantic-valentines-gifts-cybercriminal/#comments Fri, 13 Feb 2015 13:09:07 +0000 http://www.welivesecurity.com/?p=58448 We've already looked at online dating scams to be aware of for Valentines Day, but here's some more threats that not-so-special someone could end up sending you, if you're not careful!

The post 7 unromantic Valentines gifts from a cybercriminal appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/13/7-unromantic-valentines-gifts-cybercriminal/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/bombones-color-full-2.png
Electronic health records and data abuse: it’s about more than medical info http://www.welivesecurity.com/2015/02/13/medical-data-theft-fraud-ehr/ http://www.welivesecurity.com/2015/02/13/medical-data-theft-fraud-ehr/#comments Fri, 13 Feb 2015 13:01:32 +0000 http://www.welivesecurity.com/?p=58280 After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.

The post Electronic health records and data abuse: it’s about more than medical info appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/13/medical-data-theft-fraud-ehr/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/ehr-hacking-view.png
MyCoin closure leaves $387 million missing in investor funds http://www.welivesecurity.com/2015/02/12/mycoin-closure-leaves-387-million-missing-investor-funds/ http://www.welivesecurity.com/2015/02/12/mycoin-closure-leaves-387-million-missing-investor-funds/#comments Thu, 12 Feb 2015 16:39:39 +0000 http://www.welivesecurity.com/?p=58386 Investors fear they may have lost up to $387 million after Bitcoin exchange MyCoin shut down this week, reports ZD Net.

The post MyCoin closure leaves $387 million missing in investor funds appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/12/mycoin-closure-leaves-387-million-missing-investor-funds/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/mycoin-bitcoin-closure-investor-1.jpg
Is your valentine for real? Six signs you might be falling for an online dating scam http://www.welivesecurity.com/2015/02/12/six-valentines-online-dating-scams/ http://www.welivesecurity.com/2015/02/12/six-valentines-online-dating-scams/#comments Thu, 12 Feb 2015 13:50:41 +0000 http://www.welivesecurity.com/?p=58370 With Valentine’s Day nearly upon us, millions will be looking for love online. Here's six online dating scams to look out for.

The post Is your valentine for real? Six signs you might be falling for an online dating scam appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/12/six-valentines-online-dating-scams/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/online-dating-scams-header.jpg
Facebook launches ThreatExchange for companies to share security threats http://www.welivesecurity.com/2015/02/12/facebook-launches-threatexchange-companies-share-security-threats/ http://www.welivesecurity.com/2015/02/12/facebook-launches-threatexchange-companies-share-security-threats/#comments Thu, 12 Feb 2015 12:17:20 +0000 http://www.welivesecurity.com/?p=58375 Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.

The post Facebook launches ThreatExchange for companies to share security threats appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/12/facebook-launches-threatexchange-companies-share-security-threats/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/facebook_compartir_amenazas.jpg
Security terms explained: What does Zero Day mean? http://www.welivesecurity.com/2015/02/11/security-terms-explained-zero-day-mean/ http://www.welivesecurity.com/2015/02/11/security-terms-explained-zero-day-mean/#comments Wed, 11 Feb 2015 18:22:16 +0000 http://www.welivesecurity.com/?p=58345 One of the terms I’m most often asked to explain is what a “zero day” vulnerability or exploit is; let’s look at what that phrase entails.

The post Security terms explained: What does Zero Day mean? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/11/security-terms-explained-zero-day-mean/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/ScreenDoor.jpg
Cyber Threat Intelligence Integration Center: will CTIIC be a game changer? http://www.welivesecurity.com/2015/02/11/cyber-threat-intelligence-integration-center-cticc/ http://www.welivesecurity.com/2015/02/11/cyber-threat-intelligence-integration-center-cticc/#comments Wed, 11 Feb 2015 14:01:56 +0000 http://www.welivesecurity.com/?p=58292 Is America's new Cyber Threat Intelligence Integration Center a step forward? Or a duplication of the National Cybersecurity and Communications Integration Center at DHS?

The post Cyber Threat Intelligence Integration Center: will CTIIC be a game changer? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/11/cyber-threat-intelligence-integration-center-cticc/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/nccic-monaco.jpg
Outlook app blocked by EU parliament over ‘serious security issues’ http://www.welivesecurity.com/2015/02/11/outlook-app-blocked-eu-parliament-serious-security-issues/ http://www.welivesecurity.com/2015/02/11/outlook-app-blocked-eu-parliament-serious-security-issues/#comments Wed, 11 Feb 2015 12:37:47 +0000 http://www.welivesecurity.com/?p=58304 The Microsoft Outlook app has been banned from use in the EU Parliament, according to emails from the parliament's IT department, seen by PC World.

The post Outlook app blocked by EU parliament over ‘serious security issues’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/11/outlook-app-blocked-eu-parliament-serious-security-issues/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/EU-parliament-building.jpg
White House creates new agency to centralize cyberthreat intelligence http://www.welivesecurity.com/2015/02/11/white-house-creates-new-agency-centralize-cyberthreat-intelligence/ http://www.welivesecurity.com/2015/02/11/white-house-creates-new-agency-centralize-cyberthreat-intelligence/#comments Wed, 11 Feb 2015 11:57:28 +0000 http://www.welivesecurity.com/?p=58307 The White House is creating a new agency to help counter cyberthreats, analyzing intelligence from around the government so it is better equipped to deal with attacks.

The post White House creates new agency to centralize cyberthreat intelligence appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/11/white-house-creates-new-agency-centralize-cyberthreat-intelligence/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/white-house-cybercrime-agency.jpg
Census Scams and ‘Grandparent Scams’ http://www.welivesecurity.com/2015/02/11/census-scams-grandparent-scams/ http://www.welivesecurity.com/2015/02/11/census-scams-grandparent-scams/#comments Wed, 11 Feb 2015 04:41:17 +0000 http://www.welivesecurity.com/?p=58081 Two phone scams of a type that might be new to you: fake surveys asking dangerous questions, and a Londoning scam that seems to target seniors.

The post Census Scams and ‘Grandparent Scams’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/11/census-scams-grandparent-scams/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Franklin-copy.jpg
WhatsApp privacy is ‘broken,’ reveals proof-of-concept hack http://www.welivesecurity.com/2015/02/10/whatsapp-privacy-broken-reveals-proof-concept-hack/ http://www.welivesecurity.com/2015/02/10/whatsapp-privacy-broken-reveals-proof-concept-hack/#comments Tue, 10 Feb 2015 14:00:48 +0000 http://www.welivesecurity.com/?p=58230 WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.

The post WhatsApp privacy is ‘broken,’ reveals proof-of-concept hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/10/whatsapp-privacy-broken-reveals-proof-concept-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/privacidad_de_whatsapp.jpg
How to spot a Facebook hoax http://www.welivesecurity.com/videos/spot-facebook-hoax/ http://www.welivesecurity.com/videos/spot-facebook-hoax/#comments Tue, 10 Feb 2015 13:00:32 +0000 http://www.welivesecurity.com/?post_type=post_video&p=58043 Hoaxes are all over Facebook so it's vital that you know what to look out for. Keep in mind these 5 top tips when scrolling through your news feed.

The post How to spot a Facebook hoax appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/spot-facebook-hoax/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/09.jpg
Microsoft phishing email targeting corporate networks with ‘neurotic malware’ http://www.welivesecurity.com/2015/02/10/microsoft-phishing-email-targeting-corporate-networks-neurotic-malware/ http://www.welivesecurity.com/2015/02/10/microsoft-phishing-email-targeting-corporate-networks-neurotic-malware/#comments Tue, 10 Feb 2015 12:04:07 +0000 http://www.welivesecurity.com/?p=58228 Security researchers have uncovered a trojan that evades sandboxes specifically targeted at corporate users, hidden in legitimate looking phishing email that apes Microsoft's Volume License.

The post Microsoft phishing email targeting corporate networks with ‘neurotic malware’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/10/microsoft-phishing-email-targeting-corporate-networks-neurotic-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/microsoft-open-sources-net.jpg
It’s Safer Internet Day. So where is our Internet of Secure Things? http://www.welivesecurity.com/2015/02/10/safer-internet-day-iot/ http://www.welivesecurity.com/2015/02/10/safer-internet-day-iot/#comments Tue, 10 Feb 2015 08:34:27 +0000 http://www.welivesecurity.com/?p=58172 It's Safer Internet Day. But millions of devices which have not been designed with security in mind are connecting to the internet. Shouldn't we be able to tell the manufacturers that enough is enough?

The post It’s Safer Internet Day. So where is our Internet of Secure Things? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/10/safer-internet-day-iot/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Safer_Internet_Day.jpeg
Watch how car hackers can disable brakes and steal your personal data http://www.welivesecurity.com/2015/02/10/senator-car-hacking/ http://www.welivesecurity.com/2015/02/10/senator-car-hacking/#comments Tue, 10 Feb 2015 08:21:15 +0000 http://www.welivesecurity.com/?p=58191 Modern cars are more and more dependent on computer systems. And guess what? They can be hacked.

The post Watch how car hackers can disable brakes and steal your personal data appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/10/senator-car-hacking/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/car-623x425.jpeg
Anthem hack victims hit with phishing scams http://www.welivesecurity.com/2015/02/09/anthem-hack-victims-hit-phishing-scams/ http://www.welivesecurity.com/2015/02/09/anthem-hack-victims-hit-phishing-scams/#comments Mon, 09 Feb 2015 14:32:17 +0000 http://www.welivesecurity.com/?p=58116 Victims of the Anthem Inc health insurance hack are being bombarded with phishing scams including fraudulent emails and cold calls, reports Slashgear.

The post Anthem hack victims hit with phishing scams appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/09/anthem-hack-victims-hit-phishing-scams/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/anthem-health-insurance-phishing.jpg
UK Government publishes its guidelines for ‘equipment interference’ http://www.welivesecurity.com/2015/02/09/uk-government-publishes-guidelines-equipment-interference/ http://www.welivesecurity.com/2015/02/09/uk-government-publishes-guidelines-equipment-interference/#comments Mon, 09 Feb 2015 14:08:32 +0000 http://www.welivesecurity.com/?p=58118 The British government has released a document outlining the rules that British spy and law enforcement agencies have to follow in their hacking activities, reports The Guardian.

The post UK Government publishes its guidelines for ‘equipment interference’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/09/uk-government-publishes-guidelines-equipment-interference/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/david-cameron-gchq.jpg
How to stay safe on social media – 5 top tips http://www.welivesecurity.com/videos/stay-safe-social-media-5-top-tips/ http://www.welivesecurity.com/videos/stay-safe-social-media-5-top-tips/#comments Mon, 09 Feb 2015 13:00:37 +0000 http://www.welivesecurity.com/?post_type=post_video&p=58040 As social media becomes an increasingly large part of our everyday lives, It's easy to forget the dangers hiding behind our feeds. So, remember these five top tips next time you login to Facebook and Twitter.

The post How to stay safe on social media – 5 top tips appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/stay-safe-social-media-5-top-tips/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/07.jpg
Common eBay scams and how to avoid them http://www.welivesecurity.com/2015/02/09/common-ebay-scams-avoid/ http://www.welivesecurity.com/2015/02/09/common-ebay-scams-avoid/#comments Mon, 09 Feb 2015 12:04:38 +0000 http://www.welivesecurity.com/?p=58100 Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most common eBay scams and how they can be avoided.

The post Common eBay scams and how to avoid them appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/09/common-ebay-scams-avoid/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/eBay-Betrug.jpg
Stop talking in front of Samsung TVs… if you value your privacy http://www.welivesecurity.com/2015/02/09/samsung-tv-privacy/ http://www.welivesecurity.com/2015/02/09/samsung-tv-privacy/#comments Mon, 09 Feb 2015 11:33:15 +0000 http://www.welivesecurity.com/?p=58090 Your internet-enabled Samsung Smart TV could be listening to everything you say, and sharing it with third parties.

The post Stop talking in front of Samsung TVs… if you value your privacy appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/09/samsung-tv-privacy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/smart-tv-623x425.jpeg
Patch Now – Adobe Vulnerabilities Under Attack http://www.welivesecurity.com/2015/02/06/patch-now-adobe-vulnerabilities-attack/ http://www.welivesecurity.com/2015/02/06/patch-now-adobe-vulnerabilities-attack/#comments Fri, 06 Feb 2015 17:45:09 +0000 http://www.welivesecurity.com/?p=58073 This has not been a great week for Adobe; they have been scrambling to fix a number of critical vulnerabilities in their Flash Player product that are being used in active attacks. But a patch is now available to cover all these vulnerabilities - so patch now!

The post Patch Now – Adobe Vulnerabilities Under Attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/02/06/patch-now-adobe-vulnerabilities-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/flash-warning.png