We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Thu, 30 Oct 2014 17:36:29 +0000 en-US hourly 1 “More human” carder malware emerges for sale in dark web http://www.welivesecurity.com/2014/10/30/human-carder-malware-emerges-sale-dark-web/ http://www.welivesecurity.com/2014/10/30/human-carder-malware-emerges-sale-dark-web/#comments Thu, 30 Oct 2014 17:36:29 +0000 “More human” carder malware emerges for sale in dark web http://www.welivesecurity.com/?p=53581 A tool for cybercriminals that promises to use stolen credit card details in a more ‘human way’ to bypass fraud detection has been found on sale for as little as $180, according to The Register. “Voxis Platform” is described as “advanced cash out software”, which will help cybercriminals earn “astronomical amounts” by mimicking human behavior on different

The post “More human” carder malware emerges for sale in dark web appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/30/human-carder-malware-emerges-sale-dark-web/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/credit-cards-malware.jpg
Stealthy malware uses Gmail drafts to steal data http://www.welivesecurity.com/2014/10/30/stealthy-malware-uses-gmail-drafts-steal-data/ http://www.welivesecurity.com/2014/10/30/stealthy-malware-uses-gmail-drafts-steal-data/#comments Thu, 30 Oct 2014 16:23:45 +0000 Stealthy malware uses Gmail drafts to steal data http://www.welivesecurity.com/?p=53571 A new strain of malware that uses Gmail drafts in an invisible Internet Explorer window, has been discovered. According to Network World, the malware uses the drafts folder as "the command and control to steal data."

The post Stealthy malware uses Gmail drafts to steal data appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/30/stealthy-malware-uses-gmail-drafts-steal-data/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Gmail-drafts-malware.jpg
Wearable tech and security – can watches help? http://www.welivesecurity.com/2014/10/30/wearable-tech/ http://www.welivesecurity.com/2014/10/30/wearable-tech/#comments Thu, 30 Oct 2014 15:51:00 +0000 Wearable tech and security – can watches help? http://www.welivesecurity.com/?p=53547 So far, wearable tech has been of interest mainly to fitness fiends - but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even 'three-factor security'. Can a watch really keep secrets?

The post Wearable tech and security – can watches help? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/30/wearable-tech/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/android-wear-e1414677922816.png
Top Cyber Security Awareness Month themes, topics, and resources http://www.welivesecurity.com/2014/10/29/top-cyber-security-awareness-topics-themes-resources/ http://www.welivesecurity.com/2014/10/29/top-cyber-security-awareness-topics-themes-resources/#comments Wed, 29 Oct 2014 17:18:29 +0000 Top Cyber Security Awareness Month themes, topics, and resources http://www.welivesecurity.com/?p=53386 National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).

The post Top Cyber Security Awareness Month themes, topics, and resources appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/29/top-cyber-security-awareness-topics-themes-resources/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/ncsam-2014-10.png
‘Find My Mobile’ system can be used to attack Samsung handsets http://www.welivesecurity.com/2014/10/29/find-mobile-system-can-used-attack-samsung-handsets/ http://www.welivesecurity.com/2014/10/29/find-mobile-system-can-used-attack-samsung-handsets/#comments Wed, 29 Oct 2014 16:45:46 +0000 ‘Find My Mobile’ system can be used to attack Samsung handsets http://www.welivesecurity.com/?p=53492 One of the most popular and useful security functions of mobile handsets can be turned against the owner.

The post ‘Find My Mobile’ system can be used to attack Samsung handsets appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/29/find-mobile-system-can-used-attack-samsung-handsets/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Samsung-find-my-phone-can-be-hacked.jpg
White House hit by “sustained” cyber attack, hackers breach unclassified network http://www.welivesecurity.com/2014/10/29/white-house-hack/ http://www.welivesecurity.com/2014/10/29/white-house-hack/#comments Wed, 29 Oct 2014 11:16:00 +0000 White House hit by “sustained” cyber attack, hackers breach unclassified network http://www.welivesecurity.com/?p=53471 IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?

The post White House hit by “sustained” cyber attack, hackers breach unclassified network appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/29/white-house-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/white-house-computer-623x425.jpeg
Google outlines new security features in Android 5.0 http://www.welivesecurity.com/2014/10/29/google-outlines-new-security-features-android-5-0/ http://www.welivesecurity.com/2014/10/29/google-outlines-new-security-features-android-5-0/#comments Wed, 29 Oct 2014 10:49:51 +0000 Google outlines new security features in Android 5.0 http://www.welivesecurity.com/?p=53446 Google has outlined the enhanced security credentials of the upcoming Android 5.0 - nicknamed Lollipop - in an official blog post.

The post Google outlines new security features in Android 5.0 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/29/google-outlines-new-security-features-android-5-0/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Lollipop-Forest.jpg
AVAR Down Under – Security Researchers at Work http://www.welivesecurity.com/2014/10/28/avar-security-researchers-work/ http://www.welivesecurity.com/2014/10/28/avar-security-researchers-work/#comments Tue, 28 Oct 2014 18:14:58 +0000 AVAR Down Under – Security Researchers at Work http://www.welivesecurity.com/?p=53439 ESET will be well represented in papers presented at the AVAR conference in November, but that's not the only interesting content on the agenda.

The post AVAR Down Under – Security Researchers at Work appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/28/avar-security-researchers-work/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/bridge3.jpg
British job centers to introduce biometric recognition http://www.welivesecurity.com/2014/10/28/british-job-centers-introduce-biometric-recognition/ http://www.welivesecurity.com/2014/10/28/british-job-centers-introduce-biometric-recognition/#comments Tue, 28 Oct 2014 16:40:14 +0000 British job centers to introduce biometric recognition http://www.welivesecurity.com/?p=53430 Job centers across the United Kingdom are due to get a technological makeover, courtesy of biometric and signature recognition pads, reports IT Pro Portal.

The post British job centers to introduce biometric recognition appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/28/british-job-centers-introduce-biometric-recognition/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Job-Centre-Plus-biometrics.jpg
Fidelity National Financial warns of data leak after phishing attack http://www.welivesecurity.com/2014/10/28/fidelity-national-financial-warns-data-leak-phishing-attack/ http://www.welivesecurity.com/2014/10/28/fidelity-national-financial-warns-data-leak-phishing-attack/#comments Tue, 28 Oct 2014 15:17:23 +0000 Fidelity National Financial warns of data leak after phishing attack http://www.welivesecurity.com/?p=53420 Fidelity National Financial has been contacting an "undisclosed number of individuals", notifying them that a selection of personal data may have been exposed after some of the Fortune 500 company's employees had their email accounts targeted by a phishing campaign, SC Magazine reports.

The post Fidelity National Financial warns of data leak after phishing attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/28/fidelity-national-financial-warns-data-leak-phishing-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/phishing1.jpg
How do open source tools stay secure? http://www.welivesecurity.com/2014/10/27/open-source-tools-stay-secure/ http://www.welivesecurity.com/2014/10/27/open-source-tools-stay-secure/#comments Mon, 27 Oct 2014 20:20:56 +0000 How do open source tools stay secure? http://www.welivesecurity.com/?p=53337 Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,

The post How do open source tools stay secure? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/27/open-source-tools-stay-secure/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/open-source-icons.png
42% of Americans hit by regular online attacks, says Microsoft survey http://www.welivesecurity.com/2014/10/27/42-americans-hit-regular-online-attacks-says-microsoft-survey/ http://www.welivesecurity.com/2014/10/27/42-americans-hit-regular-online-attacks-says-microsoft-survey/#comments Mon, 27 Oct 2014 17:09:12 +0000 42% of Americans hit by regular online attacks, says Microsoft survey http://www.welivesecurity.com/?p=53366 A study by Microsoft has revealed that 42 percent of Americans face 'weekly or daily' attacks by cybercriminals trying to access their computers, Network World reports.

The post 42% of Americans hit by regular online attacks, says Microsoft survey appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/27/42-americans-hit-regular-online-attacks-says-microsoft-survey/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/phishing.jpg
Tor users targeted with exit node malware http://www.welivesecurity.com/2014/10/27/tor-users-targeted-exit-node-malware/ http://www.welivesecurity.com/2014/10/27/tor-users-targeted-exit-node-malware/#comments Mon, 27 Oct 2014 16:24:21 +0000 Tor users targeted with exit node malware http://www.welivesecurity.com/?p=53363 An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this "would not prevent copycat attackers from the more than 100 exit nodes in operation."

The post Tor users targeted with exit node malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/27/tor-users-targeted-exit-node-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/tor-onion.jpg
Internet trolls – how to deal with online abuse http://www.welivesecurity.com/2014/10/27/internet-trolls-deal-online-abuse/ http://www.welivesecurity.com/2014/10/27/internet-trolls-deal-online-abuse/#comments Mon, 27 Oct 2014 15:07:41 +0000 Internet trolls – how to deal with online abuse http://www.welivesecurity.com/?p=53339 Most internet users have faced some kind of problems with internet trolls - and a new study has thrown light on who they are. We discuss how best to deal with the online pests.

The post Internet trolls – how to deal with online abuse appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/27/internet-trolls-deal-online-abuse/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/internettroll.png
New Tor routers seeking crowdfunding appear as Anonabox is pulled by Kickstarter http://www.welivesecurity.com/2014/10/24/new-crowdfunding-tor-routers-appear-anonabox-pulled-kickstarter/ http://www.welivesecurity.com/2014/10/24/new-crowdfunding-tor-routers-appear-anonabox-pulled-kickstarter/#comments Fri, 24 Oct 2014 16:52:14 +0000 New Tor routers seeking crowdfunding appear as Anonabox is pulled by Kickstarter http://www.welivesecurity.com/?p=53294 A selection of rival privacy conscious Tor routers have appeared on crowdfunding sites after the Anonabox was surprisingly pulled just days after smashing its modest funding targets.

The post New Tor routers seeking crowdfunding appear as Anonabox is pulled by Kickstarter appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/new-crowdfunding-tor-routers-appear-anonabox-pulled-kickstarter/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Screen-Shot-2014-10-14-at-16.47.00.png
Twitter: “We’re finally getting rid of the password” http://www.welivesecurity.com/2014/10/24/twitter-finally-getting-rid-password/ http://www.welivesecurity.com/2014/10/24/twitter-finally-getting-rid-password/#comments Fri, 24 Oct 2014 16:09:03 +0000 Twitter: “We’re finally getting rid of the password” http://www.welivesecurity.com/?p=53263 Popular microblogging platform Twitter is taking bold steps to try and put an end to the password as we know it, according to Sky News.

The post Twitter: “We’re finally getting rid of the password” appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/twitter-finally-getting-rid-password/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Twitter-were-getting-rid-of-the-password.jpg
Could hackers give you a heart attack or drugs overdose? US authorities investigate http://www.welivesecurity.com/2014/10/24/hacker-heart-attack-medical/ http://www.welivesecurity.com/2014/10/24/hacker-heart-attack-medical/#comments Fri, 24 Oct 2014 15:03:46 +0000 Could hackers give you a heart attack or drugs overdose? US authorities investigate http://www.welivesecurity.com/?p=53252 There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.

The post Could hackers give you a heart attack or drugs overdose? US authorities investigate appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/hacker-heart-attack-medical/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/xray-623x425-1.jpeg
Ready, set, shop: 10 top tips for a safe shopping season http://www.welivesecurity.com/2014/10/24/ready-set-shop-10-top-tips-safe-shopping-season/ http://www.welivesecurity.com/2014/10/24/ready-set-shop-10-top-tips-safe-shopping-season/#comments Fri, 24 Oct 2014 14:45:15 +0000 Ready, set, shop: 10 top tips for a safe shopping season http://www.welivesecurity.com/?p=53188 Tips for safe holiday shopping: whether you shop online or at the mall, there are some simple strategies that can protect your bank accounts and payment cards against criminal hackers and scammers.

The post Ready, set, shop: 10 top tips for a safe shopping season appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/ready-set-shop-10-top-tips-safe-shopping-season/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/card-swipe-640.png
Counter surveillance tech – can gadgets spy-proof your life? http://www.welivesecurity.com/2014/10/24/counter-surveillance/ http://www.welivesecurity.com/2014/10/24/counter-surveillance/#comments Fri, 24 Oct 2014 14:19:09 +0000 Counter surveillance tech – can gadgets spy-proof your life? http://www.welivesecurity.com/?p=53229 Over the past few years, counter surveillance gadgets which might have been the preserve of secretive government departments a decade ago have suddenly hit mainstream shops - from Mission Impossible-stlye self-destructing drives to some rather eerie counter-surveillance masks.

The post Counter surveillance tech – can gadgets spy-proof your life? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/24/counter-surveillance/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/masky.jpg
Top 5 Scariest Zombie Botnets http://www.welivesecurity.com/2014/10/23/top-5-scariest-zombie-botnets/ http://www.welivesecurity.com/2014/10/23/top-5-scariest-zombie-botnets/#comments Thu, 23 Oct 2014 15:45:05 +0000 Top 5 Scariest Zombie Botnets http://www.welivesecurity.com/?p=53137 An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

The post Top 5 Scariest Zombie Botnets appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/23/top-5-scariest-zombie-botnets/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/zombie_botnet.png
Shopping safely with Amazon http://www.welivesecurity.com/videos/shopping-safely-amazon/ http://www.welivesecurity.com/videos/shopping-safely-amazon/#comments Thu, 23 Oct 2014 14:54:15 +0000 Shopping safely with Amazon http://www.welivesecurity.com/?post_type=post_video&p=53170 Online shopping can be risky even if you use world renowned websites such as Amazon. Take a look at our top tips for how to shop safely with the online store.

The post Shopping safely with Amazon appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/shopping-safely-amazon/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/05.jpg
How to speed up your computer http://www.welivesecurity.com/videos/speed-computer/ http://www.welivesecurity.com/videos/speed-computer/#comments Thu, 23 Oct 2014 14:48:02 +0000 How to speed up your computer http://www.welivesecurity.com/?post_type=post_video&p=53166 A slow computer can be both frustrating and time consuming, so we’ve provided a few basic tips to help give your computer its speed back.

The post How to speed up your computer appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/speed-computer/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/04.jpg
Yahoo, Match and AOL hit by ransomware http://www.welivesecurity.com/2014/10/23/yahoo-match-aol-hit-ransomware/ http://www.welivesecurity.com/2014/10/23/yahoo-match-aol-hit-ransomware/#comments Thu, 23 Oct 2014 14:40:36 +0000 Yahoo, Match and AOL hit by ransomware http://www.welivesecurity.com/?p=53157 Cybercriminals taking advantage of a 'malvertising' attack on big name sites including Yahoo!, Match.com and AOL were making in the region of $25,000 per day, according to Forbes.

The post Yahoo, Match and AOL hit by ransomware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/23/yahoo-match-aol-hit-ransomware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/ransomware.jpg
The Evolution of Webinject http://www.welivesecurity.com/2014/10/23/evolution-webinject/ http://www.welivesecurity.com/2014/10/23/evolution-webinject/#comments Thu, 23 Oct 2014 11:33:44 +0000 The Evolution of Webinject http://www.welivesecurity.com/?p=53059 Last month, we presented “The Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.

The post The Evolution of Webinject appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/23/evolution-webinject/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/webinject_inyeccion_web.jpg
Windows 10 to tighten security with prominent 2FA http://www.welivesecurity.com/2014/10/23/windows-10-tighten-security-prominent-two-factor-authentication/ http://www.welivesecurity.com/2014/10/23/windows-10-tighten-security-prominent-two-factor-authentication/#comments Thu, 23 Oct 2014 10:50:32 +0000 Windows 10 to tighten security with prominent 2FA http://www.welivesecurity.com/?p=53145 Microsoft is taking aim at traditional single password systems with the upcoming version of Windows, by including build in two-factor authentication according to ZDNet, which describes the move as "audacious plans to tighten security".

The post Windows 10 to tighten security with prominent 2FA appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/23/windows-10-tighten-security-prominent-two-factor-authentication/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Windows-10-to-include-two-factor-authentication.jpg
iCloud users in China under attack. But who could be after their passwords? http://www.welivesecurity.com/2014/10/22/icloud-users-china-attack-passwords/ http://www.welivesecurity.com/2014/10/22/icloud-users-china-attack-passwords/#comments Wed, 22 Oct 2014 16:03:14 +0000 iCloud users in China under attack. But who could be after their passwords? http://www.welivesecurity.com/?p=53100 Make sure you are running a half-decent browser, don't ignore browser security warnings, and enable two-factor authentication.

That appears to be the lesson to learn from the latest attack on Chinese internet users.

The post iCloud users in China under attack. But who could be after their passwords? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/22/icloud-users-china-attack-passwords/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/icloud-china-wide.jpeg
UK takes aim at serious hacking offenses with planned life sentences http://www.welivesecurity.com/2014/10/22/uk-takes-aim-serious-hacking-offenses-planned-life-sentences/ http://www.welivesecurity.com/2014/10/22/uk-takes-aim-serious-hacking-offenses-planned-life-sentences/#comments Wed, 22 Oct 2014 15:46:30 +0000 UK takes aim at serious hacking offenses with planned life sentences http://www.welivesecurity.com/?p=53088 Law makers in Britain are discussing a dramatic increase in sentencing for serious hacking offences, according to The Register. Currently in discussion in the country's upper house, The House of Lords, the move looks to overhaul the Computer Misuse Act 1990, and includes a possible life sentence for serious hackers.

The post UK takes aim at serious hacking offenses with planned life sentences appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/22/uk-takes-aim-serious-hacking-offenses-planned-life-sentences/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/UK-takes-aim-at-serious-hacking-offenses-with-planned-life-sentences.jpg
Top 5 tips for securing your PC http://www.welivesecurity.com/videos/top-5-tips-securing-pc-2/ http://www.welivesecurity.com/videos/top-5-tips-securing-pc-2/#comments Wed, 22 Oct 2014 12:39:57 +0000 Top 5 tips for securing your PC http://www.welivesecurity.com/?post_type=post_video&p=53077 Securing your PC isn't as complex as it first appears. Here's five tips to help keep your documents safe and threats at bay.

The post Top 5 tips for securing your PC appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/top-5-tips-securing-pc-2/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/02.jpg
Google now offers USB key authentication http://www.welivesecurity.com/2014/10/22/google-now-offers-usb-key-authentication/ http://www.welivesecurity.com/2014/10/22/google-now-offers-usb-key-authentication/#comments Wed, 22 Oct 2014 11:40:01 +0000 Google now offers USB key authentication http://www.welivesecurity.com/?p=53068 Google has added an extra layer of security to its browser, by introducing USB authentication to Chrome, the company has announced in an official blog post.

The post Google now offers USB key authentication appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/22/google-now-offers-usb-key-authentication/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Google-now-offers-USB-key-authentication.jpg
Botnet malware: What it is and how to fight it http://www.welivesecurity.com/2014/10/22/botnet-malware-fight/ http://www.welivesecurity.com/2014/10/22/botnet-malware-fight/#comments Wed, 22 Oct 2014 09:21:35 +0000 Botnet malware: What it is and how to fight it http://www.welivesecurity.com/?p=52935 Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

The post Botnet malware: What it is and how to fight it appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/22/botnet-malware-fight/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/botnet_red_computadora1.jpg
Proof-of-concept worm can attack network attached storage http://www.welivesecurity.com/2014/10/21/proof-concept-worm-can-attack-network-attached-storage/ http://www.welivesecurity.com/2014/10/21/proof-concept-worm-can-attack-network-attached-storage/#comments Tue, 21 Oct 2014 16:00:24 +0000 Proof-of-concept worm can attack network attached storage http://www.welivesecurity.com/?p=52984 A proof-of-concept worm that can hunt network attached storage (or NAS) devices has been created by a security researcher. According to Tech World, the worm can target devices created by three different manufacturers.

The post Proof-of-concept worm can attack network attached storage appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/21/proof-concept-worm-can-attack-network-attached-storage/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Computer-worm.jpg
Myths about malware: an exploit is the same as malware http://www.welivesecurity.com/2014/10/21/myths-about-malware-exploit-is-the-same-as-malware/ http://www.welivesecurity.com/2014/10/21/myths-about-malware-exploit-is-the-same-as-malware/#comments Tue, 21 Oct 2014 14:32:03 +0000 Myths about malware: an exploit is the same as malware http://www.welivesecurity.com/?p=52142 In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.

The post Myths about malware: an exploit is the same as malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/21/myths-about-malware-exploit-is-the-same-as-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/08/exploit.jpg
Staples the latest to be hit by credit card breach? http://www.welivesecurity.com/2014/10/21/staples-latest-hit-credit-card-breach/ http://www.welivesecurity.com/2014/10/21/staples-latest-hit-credit-card-breach/#comments Tue, 21 Oct 2014 11:25:14 +0000 Staples the latest to be hit by credit card breach? http://www.welivesecurity.com/?p=52954 Stationary and office supply store Staples is the latest company to be dealing with a credit and debit card breach, according to Brian Krebs at Krebs on Security.

The post Staples the latest to be hit by credit card breach? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/21/staples-latest-hit-credit-card-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Staples-credit-card-breach.jpg
Facebook scans ‘paste sites’ for leaked usernames and passwords http://www.welivesecurity.com/2014/10/20/facebook-scans-paste-sites-leaked-usernames-passwords/ http://www.welivesecurity.com/2014/10/20/facebook-scans-paste-sites-leaked-usernames-passwords/#comments Mon, 20 Oct 2014 16:44:54 +0000 Facebook scans ‘paste sites’ for leaked usernames and passwords http://www.welivesecurity.com/?p=52925 Facebook has a system in place to scan public 'paste' sites for email address and password combinations to stay one step ahead of possible leaks, according to The Register.

The post Facebook scans ‘paste sites’ for leaked usernames and passwords appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/20/facebook-scans-paste-sites-leaked-usernames-passwords/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Facebook-scans-paste-sites-for-passwords.jpg
Obama signs federal credit cards security order http://www.welivesecurity.com/2014/10/20/obama-signs-federal-credit-cards-security-order/ http://www.welivesecurity.com/2014/10/20/obama-signs-federal-credit-cards-security-order/#comments Mon, 20 Oct 2014 14:27:42 +0000 Obama signs federal credit cards security order http://www.welivesecurity.com/?p=52907 President Barack Obama has signed an executive order to increase security on federal credit cards, and has urged retailers and banks to do similar to combat identify fraud, reports Reuters.

The post Obama signs federal credit cards security order appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/20/obama-signs-federal-credit-cards-security-order/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Obama-signs-federal-credit-card-security-order.jpg
Botnets: remote controls for cybercriminals http://www.welivesecurity.com/2014/10/20/botnets-remote-controls-cybercriminals/ http://www.welivesecurity.com/2014/10/20/botnets-remote-controls-cybercriminals/#comments Mon, 20 Oct 2014 08:55:44 +0000 Botnets: remote controls for cybercriminals http://www.welivesecurity.com/?p=52147 As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

The post Botnets: remote controls for cybercriminals appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/20/botnets-remote-controls-cybercriminals/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/07/cbotnet-control.jpg
Vulnerable web cams and printers have become DDoS launch platforms http://www.welivesecurity.com/2014/10/17/vulnerable-web-cams-printers-cable-modems-become-ddos-launch-platforms/ http://www.welivesecurity.com/2014/10/17/vulnerable-web-cams-printers-cable-modems-become-ddos-launch-platforms/#comments Fri, 17 Oct 2014 16:05:51 +0000 Vulnerable web cams and printers have become DDoS launch platforms http://www.welivesecurity.com/?p=52833 Over 4 million UPnP devices could be used to assist in distributed denial-of-service (DDoS) attacks, Akamai has warned.

The post Vulnerable web cams and printers have become DDoS launch platforms appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/17/vulnerable-web-cams-printers-cable-modems-become-ddos-launch-platforms/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/DDOS.jpg
A brief history of malware 28 years later http://www.welivesecurity.com/2014/10/17/infographic-brief-history-of-malware/ http://www.welivesecurity.com/2014/10/17/infographic-brief-history-of-malware/#comments Fri, 17 Oct 2014 15:05:46 +0000 A brief history of malware 28 years later http://www.welivesecurity.com/?p=52826 Malware has come a long way since its earliest days, and aided by the rapid development of the internet it's certainly faster spreading than the weeks it took in the days of floppy disk transfer.

The post A brief history of malware 28 years later appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/17/infographic-brief-history-of-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/WLS-virus_FB_28days.jpg
Android Lollipop offers password protection against factory resets http://www.welivesecurity.com/2014/10/17/android-lollipop-offers-password-protection-factory-resets/ http://www.welivesecurity.com/2014/10/17/android-lollipop-offers-password-protection-factory-resets/#comments Fri, 17 Oct 2014 13:19:33 +0000 Android Lollipop offers password protection against factory resets http://www.welivesecurity.com/?p=52801 The latest version of Android, nicknamed Lollipop, will offer a new feature that could make stolen phones a whole lot less valuable to thieves: the ability to only allow factory resets when entering a password.

The post Android Lollipop offers password protection against factory resets appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/17/android-lollipop-offers-password-protection-factory-resets/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Android-killswitch-in-lollipop.jpg
Privacy online – what you can do (and what you can’t) http://www.welivesecurity.com/2014/10/17/privacy-online-online-privacy/ http://www.welivesecurity.com/2014/10/17/privacy-online-online-privacy/#comments Fri, 17 Oct 2014 10:12:05 +0000 Privacy online – what you can do (and what you can’t) http://www.welivesecurity.com/?p=52780 Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.

The post Privacy online – what you can do (and what you can’t) appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/17/privacy-online-online-privacy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/privacidad_internet.jpg
Facebook ‘Safety Check’ allows travelers to alert family http://www.welivesecurity.com/2014/10/16/facebook-safety-check-allows-travelers-alert-family-safety/ http://www.welivesecurity.com/2014/10/16/facebook-safety-check-allows-travelers-alert-family-safety/#comments Thu, 16 Oct 2014 16:44:27 +0000 Facebook ‘Safety Check’ allows travelers to alert family http://www.welivesecurity.com/?p=52762 Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.

The post Facebook ‘Safety Check’ allows travelers to alert family appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/16/facebook-safety-check-allows-travelers-alert-family-safety/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/safetycheckmobielcarousel.jpg
iPad Air 2 – fingerprint security is here to stay http://www.welivesecurity.com/2014/10/16/ipad-air-2-fingerprint-security-stay/ http://www.welivesecurity.com/2014/10/16/ipad-air-2-fingerprint-security-stay/#comments Thu, 16 Oct 2014 15:58:34 +0000 iPad Air 2 – fingerprint security is here to stay http://www.welivesecurity.com/?p=52735 The latest version of the Apple iPad is due to be announced at an event later today, and according to Gizmodo, the Californian tech company are planning on bringing the fingerprint security system implemented in recent iPhones to its tablet market for the first time.

The post iPad Air 2 – fingerprint security is here to stay appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/16/ipad-air-2-fingerprint-security-stay/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/fingerprint-scanning.jpg
Cybercrime statistics offer a glimpse into the underworld http://www.welivesecurity.com/2014/10/16/cybercrime-statistics/ http://www.welivesecurity.com/2014/10/16/cybercrime-statistics/#comments Thu, 16 Oct 2014 15:50:58 +0000 Cybercrime statistics offer a glimpse into the underworld http://www.welivesecurity.com/?p=52737 A crime-reporting survey in Canada has offered a unique insight into how cybercrime affects a large population - and an insight into a grim underworld dominated by fraud, violence and sexual abuse.

The post Cybercrime statistics offer a glimpse into the underworld appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/16/cybercrime-statistics/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/cyberevil.jpg
Chase breach: Stolen personal info brings headaches too http://www.welivesecurity.com/2014/10/16/chase-breach-stolen-personal-info-brings-headaches/ http://www.welivesecurity.com/2014/10/16/chase-breach-stolen-personal-info-brings-headaches/#comments Thu, 16 Oct 2014 00:59:28 +0000 Chase breach: Stolen personal info brings headaches too http://www.welivesecurity.com/?p=52723 On the one hand, the breach of JP Morgan Chase is not as bad as it could have been. But how do you measure relative “badness” of a breach?

The post Chase breach: Stolen personal info brings headaches too appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/16/chase-breach-stolen-personal-info-brings-headaches/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Angry_Call.png
Hungarian soccer fans protest against stadium’s new biometric security http://www.welivesecurity.com/2014/10/15/hungarian-soccer-fans-protest-stadiums-new-biometric-security/ http://www.welivesecurity.com/2014/10/15/hungarian-soccer-fans-protest-stadiums-new-biometric-security/#comments Wed, 15 Oct 2014 16:48:05 +0000 Hungarian soccer fans protest against stadium’s new biometric security http://www.welivesecurity.com/?p=52694 Fans of Hungarian soccer team Ferencvaros have come "en masse to their home stadium in Budapest" to protest the club's new biometric ID equipment, which controls turnstile entry to the stadium, according to Biometric Update.

The post Hungarian soccer fans protest against stadium’s new biometric security appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/15/hungarian-soccer-fans-protest-stadiums-new-biometric-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Ferencvaros-introduce-biometric-ticketing.jpg
POODLE Attack – Google uncovers major flaw in SSL 3.0 http://www.welivesecurity.com/2014/10/15/poodle-attack-google-uncovers-major-flaw-ssl-3-0/ http://www.welivesecurity.com/2014/10/15/poodle-attack-google-uncovers-major-flaw-ssl-3-0/#comments Wed, 15 Oct 2014 14:40:42 +0000 POODLE Attack – Google uncovers major flaw in SSL 3.0 http://www.welivesecurity.com/?p=52663 In an announcement eerily reminiscent of the early phases of the Heartbleed flaw that took internet security by storm earlier in the year, Google has uncovered an exploit that could allow attackers to decode the plaintext traffic of a secure connection.

The post POODLE Attack – Google uncovers major flaw in SSL 3.0 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/15/poodle-attack-google-uncovers-major-flaw-ssl-3-0/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/poodle-security-bug.jpg
October is the Cyber Security Month: stats, events and advice http://www.welivesecurity.com/2014/10/15/october-cyber-security-month-stats-events-advice/ http://www.welivesecurity.com/2014/10/15/october-cyber-security-month-stats-events-advice/#comments Wed, 15 Oct 2014 14:21:46 +0000 October is the Cyber Security Month: stats, events and advice http://www.welivesecurity.com/?p=52598 Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.

The post October is the Cyber Security Month: stats, events and advice appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/15/october-cyber-security-month-stats-events-advice/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/2289377358_ddd270409a_z.jpg
Operation Windigo: “Good job, ESET!” says malware author http://www.welivesecurity.com/2014/10/15/operation-windigo-good-job-eset-says-malware-author/ http://www.welivesecurity.com/2014/10/15/operation-windigo-good-job-eset-says-malware-author/#comments Wed, 15 Oct 2014 12:00:34 +0000 Operation Windigo: “Good job, ESET!” says malware author http://www.welivesecurity.com/?p=52617 Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.

The post Operation Windigo: “Good job, ESET!” says malware author appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/15/operation-windigo-good-job-eset-says-malware-author/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Marc-Etienne_Vert.jpg
$50 Anonabox provides portable privacy via Tor http://www.welivesecurity.com/2014/10/14/50-anonabox-provides-portable-privacy-via-tor/ http://www.welivesecurity.com/2014/10/14/50-anonabox-provides-portable-privacy-via-tor/#comments Tue, 14 Oct 2014 16:39:44 +0000 $50 Anonabox provides portable privacy via Tor http://www.welivesecurity.com/?p=52562 A portable network device that sits between computer and router to offer anonymized browsing from any computer via the Tor network has smashed its Kickstarter fundraising goal just days after hitting the crowdfunding platform.

The post $50 Anonabox provides portable privacy via Tor appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/14/50-anonabox-provides-portable-privacy-via-tor/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Screen-Shot-2014-10-14-at-16.47.00.png
CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns http://www.welivesecurity.com/2014/10/14/cve-2014-4114-details-august-blackenergy-powerpoint-campaigns/ http://www.welivesecurity.com/2014/10/14/cve-2014-4114-details-august-blackenergy-powerpoint-campaigns/#comments Tue, 14 Oct 2014 15:29:13 +0000 CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns http://www.welivesecurity.com/?p=52564 In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.

The post CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/14/cve-2014-4114-details-august-blackenergy-powerpoint-campaigns/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/powerpoint-malware.jpg