We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Fri, 29 Apr 2016 22:08:40 +0000 en-US hourly 1 Security Bulletin: Steps you should take to fix a Java SE security risk on your computer http://www.welivesecurity.com/2016/04/29/fix-java-se-security-risk-on-your-computer/ http://www.welivesecurity.com/2016/04/29/fix-java-se-security-risk-on-your-computer/#comments Fri, 29 Apr 2016 15:30:08 +0000 http://www.welivesecurity.com/?p=78303 Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.

The post Security Bulletin: Steps you should take to fix a Java SE security risk on your computer appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/29/fix-java-se-security-risk-on-your-computer/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/java-bulletin.jpg
Cybercriminals ‘increasingly relying upon ransomware’ http://www.welivesecurity.com/2016/04/29/cybercriminals-increasingly-relying-upon-ransomware/ http://www.welivesecurity.com/2016/04/29/cybercriminals-increasingly-relying-upon-ransomware/#comments Fri, 29 Apr 2016 10:00:36 +0000 http://www.welivesecurity.com/?p=78637 Ransomware is being increasingly relied upon in cyberattacks, according to Verizon’s latest Data Breach Investigations Report.

The post Cybercriminals ‘increasingly relying upon ransomware’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/29/cybercriminals-increasingly-relying-upon-ransomware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/bofotolux.jpg
Ransomware is everywhere, but even black hats make mistakes http://www.welivesecurity.com/2016/04/28/ransomware-is-everywhere-but-even-black-hats-make-mistakes/ http://www.welivesecurity.com/2016/04/28/ransomware-is-everywhere-but-even-black-hats-make-mistakes/#comments Thu, 28 Apr 2016 12:30:25 +0000 http://www.welivesecurity.com/?p=78410 Ransomware is everywhere. At least that might be the impression left by a seemingly endless stream of news reports on recent cyberattacks, reports ESET's Ondrej Kubovič.

The post Ransomware is everywhere, but even black hats make mistakes appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/28/ransomware-is-everywhere-but-even-black-hats-make-mistakes/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/enzozo.jpg
Say goodbye to cyber stresses in the workplace http://www.welivesecurity.com/2016/04/28/say-goodbye-to-cyber-stresses-in-the-workplace/ http://www.welivesecurity.com/2016/04/28/say-goodbye-to-cyber-stresses-in-the-workplace/#comments Thu, 28 Apr 2016 11:30:52 +0000 http://www.welivesecurity.com/?p=78377 On World Day for Safety and Health at Work, we’ve put together a brief guide on potential cyber stresses to avoid in the workplace.

The post Say goodbye to cyber stresses in the workplace appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/28/say-goodbye-to-cyber-stresses-in-the-workplace/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Syda-Productions-623x4101.jpg
Malware found at a German nuclear power plant http://www.welivesecurity.com/2016/04/28/malware-found-german-nuclear-power-plant/ http://www.welivesecurity.com/2016/04/28/malware-found-german-nuclear-power-plant/#comments Thu, 28 Apr 2016 09:12:48 +0000 http://www.welivesecurity.com/?p=78570 Malware has been found on a computer at Gundremmingen nuclear power plant in Germany, it has been revealed. RWE states that it is not considered a threat as the infected computer is not connected to the internet.

The post Malware found at a German nuclear power plant appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/28/malware-found-german-nuclear-power-plant/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/planta_nuclear.jpg
Malware ‘used as part of a wider toolkit’ in Bangladesh Bank attack http://www.welivesecurity.com/2016/04/27/malware-used-part-wider-toolkit-bangladesh-bank-attack/ http://www.welivesecurity.com/2016/04/27/malware-used-part-wider-toolkit-bangladesh-bank-attack/#comments Wed, 27 Apr 2016 15:34:42 +0000 http://www.welivesecurity.com/?p=78521 Malware used by cybercriminals to carry out one of the biggest cyberheists in history is thought to have been “part of a wider attack toolkit”, according to a BAE Systems’ security researcher.

The post Malware ‘used as part of a wider toolkit’ in Bangladesh Bank attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/27/malware-used-part-wider-toolkit-bangladesh-bank-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Maksim-Kabakou1.jpg
The perimeter is everywhere (so where is your data really?) http://www.welivesecurity.com/2016/04/27/the-perimeter-is-everywhere-so-where-is-your-data-really/ http://www.welivesecurity.com/2016/04/27/the-perimeter-is-everywhere-so-where-is-your-data-really/#comments Wed, 27 Apr 2016 12:30:59 +0000 http://www.welivesecurity.com/?p=78371 It’s hard to protect what you don’t understand. It’s also hard to protect data if you don’t know where it is. ESET's Cameron Camp looks explores the challenges of data security.

The post The perimeter is everywhere (so where is your data really?) appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/27/the-perimeter-is-everywhere-so-where-is-your-data-really/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/agsandrew.jpg
Companies fear data breaches caused by compromised credentials http://www.welivesecurity.com/2016/04/27/companies-fear-data-breaches-caused-by-compromised-credentials/ http://www.welivesecurity.com/2016/04/27/companies-fear-data-breaches-caused-by-compromised-credentials/#comments Wed, 27 Apr 2016 11:30:07 +0000 http://www.welivesecurity.com/?p=78417 Two thirds of security professionals rate the risk of a future data breach, due to compromised credentials, as medium or high.

The post Companies fear data breaches caused by compromised credentials appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/27/companies-fear-data-breaches-caused-by-compromised-credentials/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Rob-Hyrons.jpg
Ransomware and the Internet of Things http://www.welivesecurity.com/2016/04/27/ransomware-internet-things/ http://www.welivesecurity.com/2016/04/27/ransomware-internet-things/#comments Wed, 27 Apr 2016 10:38:33 +0000 http://www.welivesecurity.com/?p=78486 A report from the Institute for Critical Infrastructure Technology warns that ransomware could be hitting more than just your regular computer in future...

The post Ransomware and the Internet of Things appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/27/ransomware-internet-things/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/ransomware-iot-623x425.jpeg
BeautifulPeople.com experiences data breach: 1m affected http://www.welivesecurity.com/2016/04/26/beautifulpeople-com-experiences-data-breach-1m-affected/ http://www.welivesecurity.com/2016/04/26/beautifulpeople-com-experiences-data-breach-1m-affected/#comments Tue, 26 Apr 2016 16:43:34 +0000 http://www.welivesecurity.com/?p=78444 The personal data of around 1.1 million people could be sold off on the black market after BeautifulPeople.com experiences data breach.

The post BeautifulPeople.com experiences data breach: 1m affected appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/26/beautifulpeople-com-experiences-data-breach-1m-affected/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/beautiful-people-dating-site-hack.jpg
Insider threats: A persistent and widespread problem http://www.welivesecurity.com/2016/04/26/insider-threats-persistent-widespread-problem/ http://www.welivesecurity.com/2016/04/26/insider-threats-persistent-widespread-problem/#comments Tue, 26 Apr 2016 11:30:51 +0000 http://www.welivesecurity.com/?p=78246 In this feature, we take a look at some of the key things you should be aware of to ensure that you are well-equipped to deal with insider threats.

The post Insider threats: A persistent and widespread problem appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/26/insider-threats-persistent-widespread-problem/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Linda-Bucklin.jpg
Data privacy and data protection: US law and legislation white paper http://www.welivesecurity.com/2016/04/26/data-privacy-data-protection-us-law-legislation-white-paper/ http://www.welivesecurity.com/2016/04/26/data-privacy-data-protection-us-law-legislation-white-paper/#comments Tue, 26 Apr 2016 10:38:19 +0000 http://www.welivesecurity.com/?p=78443 This white paper on data privacy and data protection law and legislation in the US should prove to be a handy reference during ongoing privacy debates.

The post Data privacy and data protection: US law and legislation white paper appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/26/data-privacy-data-protection-us-law-legislation-white-paper/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/data-privacy-white-paper-640a.jpg
The security review: Dorkbot, encryption and buildings http://www.welivesecurity.com/2016/04/25/security-review-dorkbot-encryption-buildings/ http://www.welivesecurity.com/2016/04/25/security-review-dorkbot-encryption-buildings/#comments Mon, 25 Apr 2016 10:00:33 +0000 http://www.welivesecurity.com/?p=78337 Welcome to this week’s security review, which includes Dorkbot, the importance of encryption and how buildings are at threat of cyberattacks.

The post The security review: Dorkbot, encryption and buildings appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/25/security-review-dorkbot-encryption-buildings/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/The-Security-Review-623x4321.jpg
SMS phishing attackers continue to pursue Apple users http://www.welivesecurity.com/2016/04/23/sms-phishing-attackers-continue-pursue-apple-users/ http://www.welivesecurity.com/2016/04/23/sms-phishing-attackers-continue-pursue-apple-users/#comments Sat, 23 Apr 2016 15:45:18 +0000 http://www.welivesecurity.com/?p=78356 You would be wrong to think that this is just an attempt by the criminals to steal your Apple ID password - bad as that would be. It's much worse than that.

The post SMS phishing attackers continue to pursue Apple users appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/23/sms-phishing-attackers-continue-pursue-apple-users/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/apple-id-623x425.jpeg
Two-factor authentication coming to PlayStation Network http://www.welivesecurity.com/2016/04/22/two-factor-authentication-coming-playstation-network/ http://www.welivesecurity.com/2016/04/22/two-factor-authentication-coming-playstation-network/#comments Fri, 22 Apr 2016 10:44:53 +0000 http://www.welivesecurity.com/?p=78318 Two-factor authentication (2FA) is to be added to the PlayStation Network, offering members even greater security.

The post Two-factor authentication coming to PlayStation Network appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/22/two-factor-authentication-coming-playstation-network/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Peter-Kotoff.jpg
Australian government spends $230m on new cybercrime strategy http://www.welivesecurity.com/2016/04/21/australian-government-spends-230m-new-cybercrime-strategy/ http://www.welivesecurity.com/2016/04/21/australian-government-spends-230m-new-cybercrime-strategy/#comments Thu, 21 Apr 2016 17:39:49 +0000 http://www.welivesecurity.com/?p=78282 The Australian government has set aside $230 million in a new cybercrime strategy with a five-pronged plan of action.

The post Australian government spends $230m on new cybercrime strategy appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/21/australian-government-spends-230m-new-cybercrime-strategy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/australia-cybercrime-strategy.jpg
Encrypt – or face a huge fine http://www.welivesecurity.com/2016/04/21/encrypt-or-face-a-huge-fine/ http://www.welivesecurity.com/2016/04/21/encrypt-or-face-a-huge-fine/#comments Thu, 21 Apr 2016 11:30:54 +0000 http://www.welivesecurity.com/?p=77671 The ICO, the UK’s independent authority that oversees data privacy, recently released a new guidance on encryption best practices. The key message - encrypt or face a big fine.

The post Encrypt – or face a huge fine appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/21/encrypt-or-face-a-huge-fine/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Maksim-Kabakou.jpg
Dorkbot: 5 years since detection http://www.welivesecurity.com/2016/04/20/dorkbot-5-years-since-detection/ http://www.welivesecurity.com/2016/04/20/dorkbot-5-years-since-detection/#comments Wed, 20 Apr 2016 11:30:50 +0000 http://www.welivesecurity.com/?p=78178 In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.

The post Dorkbot: 5 years since detection appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/20/dorkbot-5-years-since-detection/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/BeeBright.jpg
Buildings at risk of cyberattacks http://www.welivesecurity.com/2016/04/20/buildings-risk-cyberattacks/ http://www.welivesecurity.com/2016/04/20/buildings-risk-cyberattacks/#comments Wed, 20 Apr 2016 09:22:43 +0000 http://www.welivesecurity.com/?p=78217 Buildings are increasingly susceptible to cyberattacks, with the Internet of Things presenting cybercriminals with new opportunities to exploit.

The post Buildings at risk of cyberattacks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/20/buildings-risk-cyberattacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/GaudiLab.jpg
Cybercriminals could access calls and texts using just your phone number http://www.welivesecurity.com/2016/04/19/cybercriminals-access-calls-texts-using-just-phone-number/ http://www.welivesecurity.com/2016/04/19/cybercriminals-access-calls-texts-using-just-phone-number/#comments Tue, 19 Apr 2016 16:58:15 +0000 http://www.welivesecurity.com/?p=78199 Your phone number holds the key that could give cybercriminals access to your location, phone calls and texts, according to a news report.

The post Cybercriminals could access calls and texts using just your phone number appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/19/cybercriminals-access-calls-texts-using-just-phone-number/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/phone-hacking-ss7.jpg
AI and humans successfully ‘predict most cyberattacks’ http://www.welivesecurity.com/2016/04/18/ai-humans-successfully-predict-cyberattacks/ http://www.welivesecurity.com/2016/04/18/ai-humans-successfully-predict-cyberattacks/#comments Mon, 18 Apr 2016 17:12:11 +0000 http://www.welivesecurity.com/?p=78137 Researchers from MIT’s CSAIL have developed an artificial intelligence platform that can ‘predict 85% of cyberattacks’ so long as it benefits from human input.

The post AI and humans successfully ‘predict most cyberattacks’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/18/ai-humans-successfully-predict-cyberattacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Christian-Lagerek.jpg
The security review: Facebook scam, webcam security & Qbot http://www.welivesecurity.com/2016/04/18/security-review-facebook-scam-webcam-security-qbot/ http://www.welivesecurity.com/2016/04/18/security-review-facebook-scam-webcam-security-qbot/#comments Mon, 18 Apr 2016 15:32:59 +0000 http://www.welivesecurity.com/?p=78117 Welcome to this week’s security review, which includes a detailed look at a new video scam sweeping Facebook and the return of a data-stealing malware dubbed Qbot.

The post The security review: Facebook scam, webcam security & Qbot appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/18/security-review-facebook-scam-webcam-security-qbot/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/02/The-Security-Review.jpg
Cybersecurity checkup: New Ponemon study reveals how healthcare sector is doing http://www.welivesecurity.com/2016/04/18/cybersecurity-checkup-new-ponemon-study-reveals-how-healthcare-sector-is-doing/ http://www.welivesecurity.com/2016/04/18/cybersecurity-checkup-new-ponemon-study-reveals-how-healthcare-sector-is-doing/#comments Mon, 18 Apr 2016 11:30:17 +0000 http://www.welivesecurity.com/?p=77967 How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.

The post Cybersecurity checkup: New Ponemon study reveals how healthcare sector is doing appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/18/cybersecurity-checkup-new-ponemon-study-reveals-how-healthcare-sector-is-doing/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/jpg
Scammers target Apple customers for bigger rewards http://www.welivesecurity.com/2016/04/14/scammers-target-apple-customers-bigger-rewards/ http://www.welivesecurity.com/2016/04/14/scammers-target-apple-customers-bigger-rewards/#comments Thu, 14 Apr 2016 13:00:39 +0000 http://www.welivesecurity.com/?p=78036 Apple customers are prime targets for cyberattacks as they are more likely to have a high disposable income, a security expert has suggested.

The post Scammers target Apple customers for bigger rewards appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/14/scammers-target-apple-customers-bigger-rewards/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/shutterstock_359271251-1.jpg
My video, My first video, Private video: Don’t fall for this Facebook scam http://www.welivesecurity.com/2016/04/14/my-video-my-first-video-private-video-dont-fall-for-this-facebook-scam/ http://www.welivesecurity.com/2016/04/14/my-video-my-first-video-private-video-dont-fall-for-this-facebook-scam/#comments Thu, 14 Apr 2016 12:30:47 +0000 http://www.welivesecurity.com/?p=77959 My video, My first video, Private video: Don’t fall for this Facebook scam, which is infecting accounts around the world with a very high rate of success.

The post My video, My first video, Private video: Don’t fall for this Facebook scam appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/14/my-video-my-first-video-private-video-dont-fall-for-this-facebook-scam/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Lukas-Gojda.jpg
Qbot returns: New strain of data-stealing malware detected http://www.welivesecurity.com/2016/04/13/qbot-returns-new-strain-data-stealing-malware-detected/ http://www.welivesecurity.com/2016/04/13/qbot-returns-new-strain-data-stealing-malware-detected/#comments Wed, 13 Apr 2016 15:23:14 +0000 http://www.welivesecurity.com/?p=77946 Security researchers have detected a new, updated strain of the data-stealing trojan Qbot that is “harder to detect and intercept”.

The post Qbot returns: New strain of data-stealing malware detected appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/13/qbot-returns-new-strain-data-stealing-malware-detected/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/shutterstock_347785832.jpg
Medical data breach leads to a record cash settlement http://www.welivesecurity.com/2016/04/13/medical-data-breach-leads-record-cash-settlement/ http://www.welivesecurity.com/2016/04/13/medical-data-breach-leads-record-cash-settlement/#comments Wed, 13 Apr 2016 11:34:29 +0000 http://www.welivesecurity.com/?p=77878 California hospital pays the largest sum per plaintiff in history for its inability to secure the patients’ medical data.

The post Medical data breach leads to a record cash settlement appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/13/medical-data-breach-leads-record-cash-settlement/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/wk1003mike.jpg
FDIC suffers ‘inadvertent’ data breach affecting 44,000 customers http://www.welivesecurity.com/2016/04/13/fdic-suffers-inadvertent-data-breach-affecting-44000-customers/ http://www.welivesecurity.com/2016/04/13/fdic-suffers-inadvertent-data-breach-affecting-44000-customers/#comments Wed, 13 Apr 2016 06:52:40 +0000 http://www.welivesecurity.com/?p=77895 The personal information of 44,000 FDIC customers has been breached by a former employee, who left the agency carrying the data on a personal storage device.

The post FDIC suffers ‘inadvertent’ data breach affecting 44,000 customers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/13/fdic-suffers-inadvertent-data-breach-affecting-44000-customers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/fdic-breach.jpg
And how do you protect your webcam? http://www.welivesecurity.com/2016/04/12/and-how-do-you-protect-your-webcam/ http://www.welivesecurity.com/2016/04/12/and-how-do-you-protect-your-webcam/#comments Tue, 12 Apr 2016 11:45:20 +0000 http://www.welivesecurity.com/?p=77870 Recently, FBI director James Comey revealed that he covers his webcam with tape to protect his privacy. It begs the question: How do you protect your webcam?

The post And how do you protect your webcam? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/12/and-how-do-you-protect-your-webcam/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Feng-Yu.jpg
The security review: Locky, Mumblehard takedown and Facebook scams http://www.welivesecurity.com/2016/04/11/security-review-locky-mumblehard-takedown-facebook-scams/ http://www.welivesecurity.com/2016/04/11/security-review-locky-mumblehard-takedown-facebook-scams/#comments Mon, 11 Apr 2016 11:18:34 +0000 http://www.welivesecurity.com/?p=77823 Welcome to this week’s security review, which includes an in-depth look at how the ransomware dubbed Locky is infiltrating computer systems.

The post The security review: Locky, Mumblehard takedown and Facebook scams appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/11/security-review-locky-mumblehard-takedown-facebook-scams/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/The-Security-Review-623x432.jpg
Windows XP: The zombie OS ‘lives’ on http://www.welivesecurity.com/2016/04/08/windows-xp-zombie-os-lives/ http://www.welivesecurity.com/2016/04/08/windows-xp-zombie-os-lives/#comments Fri, 08 Apr 2016 11:49:03 +0000 http://www.welivesecurity.com/?p=77605 Despite the fact that there haven’t been any security updates or patches rolled out for Windows XP – with some industrial solutions being the exception – the system still runs on almost every tenth computer worldwide.

The post Windows XP: The zombie OS ‘lives’ on appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/08/windows-xp-zombie-os-lives/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Kuprevich.jpg
50 million Turkish citizens could be exposed in massive data breach http://www.welivesecurity.com/2016/04/07/50-million-turkish-citizens-exposed-massive-data-breach/ http://www.welivesecurity.com/2016/04/07/50-million-turkish-citizens-exposed-massive-data-breach/#comments Thu, 07 Apr 2016 17:04:15 +0000 http://www.welivesecurity.com/?p=77776 More than half of the Turkish population could have their personal details exposed in a massive new data breach.

The post 50 million Turkish citizens could be exposed in massive data breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/07/50-million-turkish-citizens-exposed-massive-data-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/shutterstock_147000938.jpg
Mumblehard takedown ends army of Linux servers from spamming http://www.welivesecurity.com/2016/04/07/mumblehard-takedown-ends-army-of-linux-servers-from-spamming/ http://www.welivesecurity.com/2016/04/07/mumblehard-takedown-ends-army-of-linux-servers-from-spamming/#comments Thu, 07 Apr 2016 12:45:51 +0000 http://www.welivesecurity.com/?p=77572 One year after the release of the technical analysis of the Mumblehard Linux botnet, it is no longer active. ESET, in collaboration with the Cyber Police of Ukraine and CyS Centrum LLC, have taken down the botnet, stopping its spamming activities.

The post Mumblehard takedown ends army of Linux servers from spamming appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/07/mumblehard-takedown-ends-army-of-linux-servers-from-spamming/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Tashatuvango.jpg
Introducing Metaphor: Another Android Stagefright exploit http://www.welivesecurity.com/2016/04/07/introducing-metaphor-another-android-stagefright-exploit/ http://www.welivesecurity.com/2016/04/07/introducing-metaphor-another-android-stagefright-exploit/#comments Thu, 07 Apr 2016 11:49:44 +0000 http://www.welivesecurity.com/?p=77575 Researchers in Israel have come across a new way of exploiting the Stagefright vulnerability that was uncovered last year, and which affects the library that Android uses to analyze multimedia files.

The post Introducing Metaphor: Another Android Stagefright exploit appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/07/introducing-metaphor-another-android-stagefright-exploit/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Yulia-Grigoryeva.jpg
Buying Ray-Bans? Don’t fall for this Facebook scam http://www.welivesecurity.com/2016/04/06/buying-ray-bans-dont-fall-for-this-facebook-scam/ http://www.welivesecurity.com/2016/04/06/buying-ray-bans-dont-fall-for-this-facebook-scam/#comments Wed, 06 Apr 2016 15:21:06 +0000 http://www.welivesecurity.com/?p=77690 Recently, we’ve observed a new wave of scams on Facebook. Crooks are luring social network users to visit bogus Ray-Ban e-shops and buy heavily discounted sunglasses there. Victims’ payment card details are at risk.

The post Buying Ray-Bans? Don’t fall for this Facebook scam appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/06/buying-ray-bans-dont-fall-for-this-facebook-scam/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/rayban-scam-facebook.jpg
WhatsApp adds end-to-end encryption for its one billion users http://www.welivesecurity.com/2016/04/06/whatsapp-adds-end-end-encryption-one-billion-users/ http://www.welivesecurity.com/2016/04/06/whatsapp-adds-end-end-encryption-one-billion-users/#comments Wed, 06 Apr 2016 14:31:39 +0000 http://www.welivesecurity.com/?p=77707 WhatsApp users will now benefit from more secure conversations, after the company announced it has turned on full end-to-end encryption.

The post WhatsApp adds end-to-end encryption for its one billion users appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/06/whatsapp-adds-end-end-encryption-one-billion-users/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/whatsapp.jpg
Trump Hotel Collection suffers data breach http://www.welivesecurity.com/2016/04/05/trump-hotel-collection-suffers-data-breach/ http://www.welivesecurity.com/2016/04/05/trump-hotel-collection-suffers-data-breach/#comments Tue, 05 Apr 2016 16:57:08 +0000 http://www.welivesecurity.com/?p=77629 The Trump Hotel Collection has once again suffered a data breach, according to a security expert.

The post Trump Hotel Collection suffers data breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/05/trump-hotel-collection-suffers-data-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Christopher-Halloran.jpg
Vulnerabilities, exploits and patches http://www.welivesecurity.com/2016/04/05/vulnerabilities-exploits-and-patches/ http://www.welivesecurity.com/2016/04/05/vulnerabilities-exploits-and-patches/#comments Tue, 05 Apr 2016 12:49:39 +0000 http://www.welivesecurity.com/?p=77509 David Harley, a senior research fellow at ESET, offers expert answers to six important questions that concern vulnerabilities, exploits and patches.

The post Vulnerabilities, exploits and patches appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/05/vulnerabilities-exploits-and-patches/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/alexskopje.jpg
US and Canada issue ransomware alert http://www.welivesecurity.com/2016/04/04/us-canada-issue-ransomware-alert/ http://www.welivesecurity.com/2016/04/04/us-canada-issue-ransomware-alert/#comments Mon, 04 Apr 2016 17:25:43 +0000 http://www.welivesecurity.com/?p=77594 A ransomware alert has been issued by the US and Canada to ensure that individuals and organizations are aware of the threat posed by this type of malicious software.

The post US and Canada issue ransomware alert appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/04/us-canada-issue-ransomware-alert/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/04/Pawel-Michalowski.jpg
Analysis of the Locky infection process http://www.welivesecurity.com/2016/04/04/analysis-of-the-locky-infection-process/ http://www.welivesecurity.com/2016/04/04/analysis-of-the-locky-infection-process/#comments Mon, 04 Apr 2016 08:49:59 +0000 http://www.welivesecurity.com/?p=77498 In recent months, there has been a significant increase in the number of networks and users affected by ransomware known as Locky, discusses ESET's Diego Perez.

The post Analysis of the Locky infection process appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/04/analysis-of-the-locky-infection-process/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/infeccion-locky.jpg
The security review: Remaiten, Trident and World Backup Day http://www.welivesecurity.com/2016/04/03/security-review-remaiten-trident-world-backup-day/ http://www.welivesecurity.com/2016/04/03/security-review-remaiten-trident-world-backup-day/#comments Sun, 03 Apr 2016 10:00:25 +0000 http://www.welivesecurity.com/?p=77583 Highlights from the past seven days in information security include insight into Remaiten, the Trident cybersecurity update and the value of backing up your data.

The post The security review: Remaiten, Trident and World Backup Day appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/04/03/security-review-remaiten-trident-world-backup-day/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/The-Security-Review-623x432.jpg
Ransomware threat highlights why backing up data is essential http://www.welivesecurity.com/2016/03/31/ransomware-threat-highlights-why-backing-up-data-is-essential/ http://www.welivesecurity.com/2016/03/31/ransomware-threat-highlights-why-backing-up-data-is-essential/#comments Thu, 31 Mar 2016 11:49:34 +0000 http://www.welivesecurity.com/?p=77285 There has been a marked increase in ransomware attacks recently. We take a look at what this means and why backing up your data helps you combat this threat.

The post Ransomware threat highlights why backing up data is essential appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/31/ransomware-threat-highlights-why-backing-up-data-is-essential/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/Maksim-Kabakou.jpg
Trident nuclear system to be updated to protect against hacking attacks http://www.welivesecurity.com/2016/03/30/trident-nuclear-system-updated-protect-hacking-attacks/ http://www.welivesecurity.com/2016/03/30/trident-nuclear-system-updated-protect-hacking-attacks/#comments Wed, 30 Mar 2016 13:51:35 +0000 http://www.welivesecurity.com/?p=77418 It's a tough enough job protecting your home computer, or your business network, against the rising threat of malware and determined hackers... imagine if you were responsible for the security of Britain's nuclear deterrent?

The post Trident nuclear system to be updated to protect against hacking attacks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/30/trident-nuclear-system-updated-protect-hacking-attacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/trident-623x425.jpeg
Meet Remaiten – a Linux bot on steroids targeting routers and potentially other IoT devices http://www.welivesecurity.com/2016/03/30/meet-remaiten-a-linux-bot-on-steroids-targeting-routers-and-potentially-other-iot-devices/ http://www.welivesecurity.com/2016/03/30/meet-remaiten-a-linux-bot-on-steroids-targeting-routers-and-potentially-other-iot-devices/#comments Wed, 30 Mar 2016 12:49:03 +0000 http://www.welivesecurity.com/?p=77283 ESET researchers are actively monitoring malware that targets embedded systems such as routers, gateways and wireless access points. We call this new threat Linux/Remaiten.

The post Meet Remaiten – a Linux bot on steroids targeting routers and potentially other IoT devices appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/30/meet-remaiten-a-linux-bot-on-steroids-targeting-routers-and-potentially-other-iot-devices/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/asharkyu.jpg
Banks ‘should not compensate’ victims of online fraud http://www.welivesecurity.com/2016/03/29/banks-not-compensate-victims-online-fraud/ http://www.welivesecurity.com/2016/03/29/banks-not-compensate-victims-online-fraud/#comments Tue, 29 Mar 2016 16:46:44 +0000 http://www.welivesecurity.com/?p=77300 UK Metropolitan police commissioner Sir Bernard Hogan-Howe has advised banks not to offer compensation to victims of online fraud.

The post Banks ‘should not compensate’ victims of online fraud appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/29/banks-not-compensate-victims-online-fraud/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/online-fraud-compensation-police.jpg
Facebook fights back against creepy impersonating profiles http://www.welivesecurity.com/2016/03/28/facebook-fights-back-creepy-impersonating-profiles/ http://www.welivesecurity.com/2016/03/28/facebook-fights-back-creepy-impersonating-profiles/#comments Mon, 28 Mar 2016 11:22:52 +0000 http://www.welivesecurity.com/?p=77253 It's one of the creepiest things you can experience on Facebook. You stumble across the profile of "another" user who appears to have stolen the details of your life - lock, stock and barrel. And they are spreading slurs about your character, and befriending your contacts...

The post Facebook fights back against creepy impersonating profiles appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/28/facebook-fights-back-creepy-impersonating-profiles/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/facebook-impersonator.jpeg
US charges seven Iranians for bank-related cyberattacks http://www.welivesecurity.com/2016/03/24/us-charges-seven-iranians-bank-related-cyberattacks/ http://www.welivesecurity.com/2016/03/24/us-charges-seven-iranians-bank-related-cyberattacks/#comments Thu, 24 Mar 2016 18:18:04 +0000 http://www.welivesecurity.com/?p=77248 The US Department of Justice (DoJ) has indicted seven people believed to have coordinated cyberattacks on banks between 2011 and 2013, all with links to the Iranian government.

The post US charges seven Iranians for bank-related cyberattacks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/24/us-charges-seven-iranians-bank-related-cyberattacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/shutterstock_145404793-1.jpg
ESET discovers new USB-based data stealing malware http://www.welivesecurity.com/2016/03/23/eset-discovers-new-usb-based-data-stealing-malware/ http://www.welivesecurity.com/2016/03/23/eset-discovers-new-usb-based-data-stealing-malware/#comments Wed, 23 Mar 2016 13:49:26 +0000 http://www.welivesecurity.com/?p=77132 ESET has discovered a new USB-based data stealer capable of stealthy attacks against air-gapped systems – it is also well-protected against detection and reverse-engineering.

The post ESET discovers new USB-based data stealing malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/23/eset-discovers-new-usb-based-data-stealing-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/Ton-Snoei.jpg
New self-protecting USB trojan able to avoid detection http://www.welivesecurity.com/2016/03/23/new-self-protecting-usb-trojan-able-to-avoid-detection/ http://www.welivesecurity.com/2016/03/23/new-self-protecting-usb-trojan-able-to-avoid-detection/#comments Wed, 23 Mar 2016 13:49:17 +0000 http://www.welivesecurity.com/?p=77140 A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware, reports ESET's Tomáš Gardoň.

The post New self-protecting USB trojan able to avoid detection appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/23/new-self-protecting-usb-trojan-able-to-avoid-detection/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/Thomas-Bethge.jpg
FBI could ‘bypass’ Apple to unlock San Bernardino iPhone http://www.welivesecurity.com/2016/03/22/fbi-bypass-apple-unlock-san-bernardino-iphone/ http://www.welivesecurity.com/2016/03/22/fbi-bypass-apple-unlock-san-bernardino-iphone/#comments Tue, 22 Mar 2016 17:44:16 +0000 http://www.welivesecurity.com/?p=77187 The FBI has said it may no longer need Apple’s assistance in opening the locked iPhone belonging to an attacker in December’s San Bernardino, California shooting.

The post FBI could ‘bypass’ Apple to unlock San Bernardino iPhone appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2016/03/22/fbi-bypass-apple-unlock-san-bernardino-iphone/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2016/03/apple-desbloqueo-fbi-623x410.jpg