We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Tue, 31 Mar 2015 16:19:06 +0000 en-US hourly 1 Retailers’ heavy handed fraud prevention leads to loss of sales http://www.welivesecurity.com/2015/03/31/fraud-prevention-loss-of-sales/ http://www.welivesecurity.com/2015/03/31/fraud-prevention-loss-of-sales/#comments Tue, 31 Mar 2015 16:19:06 +0000 http://www.welivesecurity.com/?p=60557 Online retailers battling with fraud prevention are losing out on genuine sales by treating their customers like criminals, according to a new report by ThreatMetrix.

The post Retailers’ heavy handed fraud prevention leads to loss of sales appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/31/fraud-prevention-loss-of-sales/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/fraud-prevention-sales-loss-1.jpg
Six ways to backup your data http://www.welivesecurity.com/2015/03/31/6-ways-to-back-up-your-data/ http://www.welivesecurity.com/2015/03/31/6-ways-to-back-up-your-data/#comments Tue, 31 Mar 2015 13:10:41 +0000 http://www.welivesecurity.com/?p=60441 Today is World Backup Day, and it goes without saying that backing up data is a thoroughly sensible thing to routinely get into the habit of doing.

The post Six ways to backup your data appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/31/6-ways-to-back-up-your-data/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/Welt_Backup_tag.jpg
Queen Elizabeth consults with cybersecurity expert over privacy fears http://www.welivesecurity.com/2015/03/31/queen-elizabeth-consults-cybersecurity-expert-privacy-fears/ http://www.welivesecurity.com/2015/03/31/queen-elizabeth-consults-cybersecurity-expert-privacy-fears/#comments Tue, 31 Mar 2015 11:47:39 +0000 http://www.welivesecurity.com/?p=60516 Queen Elizabeth has been consulting one of the United Kingdom's most prominent cybersecurity experts, leading to speculation the Royal Family may be seeking protection from hackers and spies.

The post Queen Elizabeth consults with cybersecurity expert over privacy fears appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/31/queen-elizabeth-consults-cybersecurity-expert-privacy-fears/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/Queen-elizabeth-calls-in-hacking-expert.jpg
Passport and visa details of world disclosed in accidental G20 privacy breach http://www.welivesecurity.com/2015/03/30/passport-visa-details-world-disclosed-accidental-g20-privacy-breach/ http://www.welivesecurity.com/2015/03/30/passport-visa-details-world-disclosed-accidental-g20-privacy-breach/#comments Mon, 30 Mar 2015 15:14:04 +0000 http://www.welivesecurity.com/?p=60468 A common email mistake accidentally disclosed passport and visa details of 31 world leaders attending the G20 summit in Australia, the BBC reports.

The post Passport and visa details of world disclosed in accidental G20 privacy breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/30/passport-visa-details-world-disclosed-accidental-g20-privacy-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/world-leaders-details-leaked.jpg
British Airways suffers frequent flyer account hacking http://www.welivesecurity.com/2015/03/30/british-airways-suffers-frequent-flyer-account-hacking/ http://www.welivesecurity.com/2015/03/30/british-airways-suffers-frequent-flyer-account-hacking/#comments Mon, 30 Mar 2015 10:48:52 +0000 http://www.welivesecurity.com/?p=60456 Thousands of British Airways frequent flyer accounts have been breached by hackers, reports ZDNet.

The post British Airways suffers frequent flyer account hacking appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/30/british-airways-suffers-frequent-flyer-account-hacking/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/British-Airways-hacking.jpg
Android apps track your location every three minutes, says Carnegie Mellon study http://www.welivesecurity.com/2015/03/27/android-apps-track-location-every-three-minutes-says-carnegie-mellon-study/ http://www.welivesecurity.com/2015/03/27/android-apps-track-location-every-three-minutes-says-carnegie-mellon-study/#comments Fri, 27 Mar 2015 17:04:01 +0000 http://www.welivesecurity.com/?p=60431 A Carnegie Mellon University study has discovered that a selection of Android apps collect location data on their users on average every three minutes, according to the Wall Street Journal.

The post Android apps track your location every three minutes, says Carnegie Mellon study appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/27/android-apps-track-location-every-three-minutes-says-carnegie-mellon-study/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/apps-track-you-every-three-minutes.jpg
Hackers hijack song contest with Eurovision voting app attack http://www.welivesecurity.com/2015/03/27/hackers-hijack-song-contest-eurovision-voting-app-attack/ http://www.welivesecurity.com/2015/03/27/hackers-hijack-song-contest-eurovision-voting-app-attack/#comments Fri, 27 Mar 2015 12:20:50 +0000 http://www.welivesecurity.com/?p=60408 The voting system used by the Eurovision Song Contest was briefly forced offline after a suspected cyberattack caused an "extreme" surge in activity,.

The post Hackers hijack song contest with Eurovision voting app attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/27/hackers-hijack-song-contest-eurovision-voting-app-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/europvision-voting-app-hacked.jpg
ESET’s Mark James on addressing business security employee issues http://www.welivesecurity.com/2015/03/26/esets-mark-james-addressing-business-security-employee-issues/ http://www.welivesecurity.com/2015/03/26/esets-mark-james-addressing-business-security-employee-issues/#comments Thu, 26 Mar 2015 14:43:29 +0000 http://www.welivesecurity.com/?p=59401 ESET's Mark James on the issues employees have with business security measures, and how to counter the difficulties without compromising safety.

The post ESET’s Mark James on addressing business security employee issues appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/26/esets-mark-james-addressing-business-security-employee-issues/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/01/How-can-businesses-save-money-on-internet-security-in-2015.jpg
PoSeidon Malware attacks Point of Sale credit card transactions http://www.welivesecurity.com/2015/03/26/poseidon-malware-attacks-point-sale-credit-card-transactions/ http://www.welivesecurity.com/2015/03/26/poseidon-malware-attacks-point-sale-credit-card-transactions/#comments Thu, 26 Mar 2015 14:30:42 +0000 http://www.welivesecurity.com/?p=60354 Point of Sale credit card terminals are under threat from a new malware named PoSeidon, thought to be more dangerous than the Zeus exploit kit that was used to steal millions of card details from Target customers.

The post PoSeidon Malware attacks Point of Sale credit card transactions appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/26/poseidon-malware-attacks-point-sale-credit-card-transactions/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/credit-card-poseiden-point-of-sale-malware.jpg
Tinder hack sets heterosexual men up with each other http://www.welivesecurity.com/2015/03/26/tinder-hack-sets-straight-men/ http://www.welivesecurity.com/2015/03/26/tinder-hack-sets-straight-men/#comments Thu, 26 Mar 2015 12:56:57 +0000 http://www.welivesecurity.com/?p=60360 A hacker has discovered that the openness of Tinder's API allowed him to set up unknowing men via a fake female profile they both believed that they were talking to.

The post Tinder hack sets heterosexual men up with each other appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/26/tinder-hack-sets-straight-men/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/Tinder-hack-sets-up-straight-men-with-each-other.jpg
Irish government’s Freedom of Information website hacked http://www.welivesecurity.com/2015/03/25/ireland-freedom-of-information-website-hacked/ http://www.welivesecurity.com/2015/03/25/ireland-freedom-of-information-website-hacked/#comments Wed, 25 Mar 2015 13:50:32 +0000 http://www.welivesecurity.com/?p=60276 The Irish government's Freedom of Information (FOI) website has been targeted by hackers claiming to be connected to the ISIS terror group.

The post Irish government’s Freedom of Information website hacked appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/25/ireland-freedom-of-information-website-hacked/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/ireland-irish-government-freedom-information-hacked.jpg
Threat sharing bill introduced to House of Representatives http://www.welivesecurity.com/2015/03/25/threat-sharing-bill-introduced-house-representatives/ http://www.welivesecurity.com/2015/03/25/threat-sharing-bill-introduced-house-representatives/#comments Wed, 25 Mar 2015 13:34:49 +0000 http://www.welivesecurity.com/?p=60290 The House of Representatives Intelligence Committee has introduced a new threat sharing bill designed to let businesses share details of security treats without fear of litigation, reports Gizmodo.

The post Threat sharing bill introduced to House of Representatives appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/25/threat-sharing-bill-introduced-house-representatives/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/white-house-cybercrime-agency.jpg
Canada’s “secret hacking tactics” exposed in new report http://www.welivesecurity.com/2015/03/24/canadas-secret-hacking-tactics-exposed-new-report/ http://www.welivesecurity.com/2015/03/24/canadas-secret-hacking-tactics-exposed-new-report/#comments Tue, 24 Mar 2015 17:31:52 +0000 http://www.welivesecurity.com/?p=60254 Canada has been using an array of cyberweapons to gather intelligence, spy on other governments and damage adversary infrastructure, says a new report.

The post Canada’s “secret hacking tactics” exposed in new report appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/24/canadas-secret-hacking-tactics-exposed-new-report/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/canada-government-hacking.jpg
Mobile security: IBM/Ponemon study finds enterprise app security weaknesses http://www.welivesecurity.com/2015/03/24/mobile-security-ibmponemon-study-finds-enterprise-app-security-weaknesses/ http://www.welivesecurity.com/2015/03/24/mobile-security-ibmponemon-study-finds-enterprise-app-security-weaknesses/#comments Tue, 24 Mar 2015 16:58:14 +0000 http://www.welivesecurity.com/?p=60267 Nearly 40 percent of large companies - including a significant number in the Fortune 500 - are not taking necessary precautions to secure the apps that they're providing their customers.

The post Mobile security: IBM/Ponemon study finds enterprise app security weaknesses appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/24/mobile-security-ibmponemon-study-finds-enterprise-app-security-weaknesses/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/seguridad_apps_empresas.jpg
Twitch backs down on 20-character passwords in wake of hacking http://www.welivesecurity.com/2015/03/24/twitch-backs-20-character-passwords-wake-hacking/ http://www.welivesecurity.com/2015/03/24/twitch-backs-20-character-passwords-wake-hacking/#comments Tue, 24 Mar 2015 13:44:47 +0000 http://www.welivesecurity.com/?p=60244 Twitch has backed down on its attempts to force stronger password complexity on its site post-hacking, after multiple complaints from its userbase.

The post Twitch backs down on 20-character passwords in wake of hacking appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/24/twitch-backs-20-character-passwords-wake-hacking/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/twitch-logo.jpg
Five hacker movies that got things badly wrong http://www.welivesecurity.com/2015/03/24/five-hacker-movies-got-things-badly-wrong/ http://www.welivesecurity.com/2015/03/24/five-hacker-movies-got-things-badly-wrong/#comments Tue, 24 Mar 2015 11:44:32 +0000 http://www.welivesecurity.com/?p=60098 5 hacker movies that got computer security well off the mark.

The post Five hacker movies that got things badly wrong appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/24/five-hacker-movies-got-things-badly-wrong/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/hacking-movies.jpg
Hilton HHonors accounts put at risk of hijacking through simple web flaw http://www.welivesecurity.com/2015/03/24/hilton-hhonors-flaw/ http://www.welivesecurity.com/2015/03/24/hilton-hhonors-flaw/#comments Tue, 24 Mar 2015 10:41:28 +0000 http://www.welivesecurity.com/?p=60226 Security researchers discovered a vulnerability on the Hilton HHonors website, making it straightforward to hijack any other user's account.

The post Hilton HHonors accounts put at risk of hijacking through simple web flaw appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/24/hilton-hhonors-flaw/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/hilton-623x425.jpeg
Millions of computers left vulnerable to BIOS chip hack http://www.welivesecurity.com/2015/03/23/millions-computers-left-vulnerable-bios-chip-hack/ http://www.welivesecurity.com/2015/03/23/millions-computers-left-vulnerable-bios-chip-hack/#comments Mon, 23 Mar 2015 17:40:56 +0000 http://www.welivesecurity.com/?p=60204 A vulnerability has been detected in the BIOS chips found in millions of computers which could leave users open to hacking.

The post Millions of computers left vulnerable to BIOS chip hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/23/millions-computers-left-vulnerable-bios-chip-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/BIOS_Hack.jpg
Cisco vulnerability could allow attackers to eavesdrop on private conversations http://www.welivesecurity.com/2015/03/23/cisco-vulnerability-allow-attackers-eavesdrop-private-conversations/ http://www.welivesecurity.com/2015/03/23/cisco-vulnerability-allow-attackers-eavesdrop-private-conversations/#comments Mon, 23 Mar 2015 17:40:13 +0000 http://www.welivesecurity.com/?p=60189 A vulnerability in Cisco's SPA300 and SPA500 IP phones could allow hackers to eavesdrop on private conversations from anywhere in the world, reports The Register.

The post Cisco vulnerability could allow attackers to eavesdrop on private conversations appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/23/cisco-vulnerability-allow-attackers-eavesdrop-private-conversations/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/cisco-phones-flaw-eavesdropping.jpg
UK businesses are unprepared for potential data breaches http://www.welivesecurity.com/2015/03/20/uk-businesses-unprepared-potential-data-breaches/ http://www.welivesecurity.com/2015/03/20/uk-businesses-unprepared-potential-data-breaches/#comments Fri, 20 Mar 2015 16:34:45 +0000 http://www.welivesecurity.com/?p=60128 Many UK businesses are unequipped to respond to potential data breaches, according to two new independent reports published this week.

The post UK businesses are unprepared for potential data breaches appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/20/uk-businesses-unprepared-potential-data-breaches/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/uk-businesses-data-breach-unprepared.jpg
7 tasks that waste your IT team’s time http://www.welivesecurity.com/2015/03/20/7-tasks-waste-teams-time/ http://www.welivesecurity.com/2015/03/20/7-tasks-waste-teams-time/#comments Fri, 20 Mar 2015 14:54:16 +0000 http://www.welivesecurity.com/?p=60081 IT teams' time is always limited, and it doesn't help when other things get in the way. Here's seven things that waste your IT team's time.

The post 7 tasks that waste your IT team’s time appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/20/7-tasks-waste-teams-time/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/tiempo_equipo_ti-e1425489868550.jpg
Hacker threatens cyberattacks against Detroit over court decision http://www.welivesecurity.com/2015/03/20/hacker-threatens-cyberattacks-detroit-court-decision/ http://www.welivesecurity.com/2015/03/20/hacker-threatens-cyberattacks-detroit-court-decision/#comments Fri, 20 Mar 2015 14:07:14 +0000 http://www.welivesecurity.com/?p=60124 A hacker going by the name of 'Bitcoin Baron' has issued a threat to the city of Detroit after a Wayne County Circuit Court Judge dismissed a police manslaughter charge.

The post Hacker threatens cyberattacks against Detroit over court decision appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/20/hacker-threatens-cyberattacks-detroit-court-decision/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/Hacker-threatens-cyberattacks-against-Detroit-over-court-decision.jpg
The future of security in healthcare: Mobile devices http://www.welivesecurity.com/2015/03/20/future-security-healthcare-mobile-devices/ http://www.welivesecurity.com/2015/03/20/future-security-healthcare-mobile-devices/#comments Fri, 20 Mar 2015 00:38:00 +0000 http://www.welivesecurity.com/?p=60090 The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?

The post The future of security in healthcare: Mobile devices appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/20/future-security-healthcare-mobile-devices/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/02/health-data.png
Facebook announces peer-to-peer payments between friends http://www.welivesecurity.com/2015/03/19/facebook-announces-peer-peer-payments-friends/ http://www.welivesecurity.com/2015/03/19/facebook-announces-peer-peer-payments-friends/#comments Thu, 19 Mar 2015 15:20:09 +0000 http://www.welivesecurity.com/?p=60072 Facebook has announced a new feature of its Messenger product, which allows friends to send payments directly to each other, reports Tech Crunch.

The post Facebook announces peer-to-peer payments between friends appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/19/facebook-announces-peer-peer-payments-friends/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Facebook_Porno-Betrug.jpg
Google Play security tightened with human screening process http://www.welivesecurity.com/2015/03/19/google-play-security-tightened-human-screening-process/ http://www.welivesecurity.com/2015/03/19/google-play-security-tightened-human-screening-process/#comments Thu, 19 Mar 2015 14:28:17 +0000 http://www.welivesecurity.com/?p=60055 Google is taking additional security measures to shut out malware from its app store by introducing a human screening process.

The post Google Play security tightened with human screening process appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/19/google-play-security-tightened-human-screening-process/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/google-play-security-1.jpg
Premera Breach: Healthcare businesses in the crosshairs http://www.welivesecurity.com/2015/03/18/premera-breach-healthcare-businesses-crosshairs/ http://www.welivesecurity.com/2015/03/18/premera-breach-healthcare-businesses-crosshairs/#comments Wed, 18 Mar 2015 18:08:56 +0000 http://www.welivesecurity.com/?p=60030 Criminals are targeting medical records because of their value, and as a result, medical breaches are the fastest growing type of breach. What can healthcare businesses do to get themselves out of the crosshairs?

The post Premera Breach: Healthcare businesses in the crosshairs appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/18/premera-breach-healthcare-businesses-crosshairs/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/033525317-doctor-entering-information-la.jpeg
Dark Purple’s ‘killer USB’ will fry your computer’s circuit board http://www.welivesecurity.com/2015/03/18/dark-purples-killer-usb-will-fry-computers-circuit-board/ http://www.welivesecurity.com/2015/03/18/dark-purples-killer-usb-will-fry-computers-circuit-board/#comments Wed, 18 Mar 2015 14:58:52 +0000 http://www.welivesecurity.com/?p=60006 USB drives have been known to carry viruses and malware, but a Russian electronics expert has now created a thumb drive that will literally fry your computer's circuit board with a high voltage surge.

The post Dark Purple’s ‘killer USB’ will fry your computer’s circuit board appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/18/dark-purples-killer-usb-will-fry-computers-circuit-board/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/dark-purple-killer-usb.jpg
$40k of bitcoin lost in Coinapult hot wallet hack http://www.welivesecurity.com/2015/03/18/40k-bitcoin-lost-coinapult-hot-wallet-hack/ http://www.welivesecurity.com/2015/03/18/40k-bitcoin-lost-coinapult-hot-wallet-hack/#comments Wed, 18 Mar 2015 14:48:31 +0000 http://www.welivesecurity.com/?p=60011 Coinapult, a long-running bitcoin wallet service, announced on Monday that its hot wallet had been compromised to the tune of 150 coins - around $42,900.

The post $40k of bitcoin lost in Coinapult hot wallet hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/18/40k-bitcoin-lost-coinapult-hot-wallet-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/01/bitcoin_bitstamp.jpg
9-year-old cybersecurity expert hacks Android smartphone in minutes http://www.welivesecurity.com/2015/03/17/9-year-old-cybersecurity-expert-hacks-android-smartphone-minutes/ http://www.welivesecurity.com/2015/03/17/9-year-old-cybersecurity-expert-hacks-android-smartphone-minutes/#comments Tue, 17 Mar 2015 16:00:59 +0000 http://www.welivesecurity.com/?p=59959 Wondering how secure your Android smartphone is? Well, a 9-year-old cybersecurity expert has demonstrated how hackers could steal contacts, call logs and messages within just 15 minutes.

The post 9-year-old cybersecurity expert hacks Android smartphone in minutes appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/17/9-year-old-cybersecurity-expert-hacks-android-smartphone-minutes/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/9-year-old-ceo-security-hacking-phone-1.png
Advantage Dental hacked – over 150,000 personal records breached http://www.welivesecurity.com/2015/03/17/oregons-advantage-dental-hacked/ http://www.welivesecurity.com/2015/03/17/oregons-advantage-dental-hacked/#comments Tue, 17 Mar 2015 13:18:50 +0000 http://www.welivesecurity.com/?p=59974 Advantage Dental has sent out notices to 151,626 customers after a hacking which may have led to the leaking of valuable patient data, according to the Portland Tribune.

The post Advantage Dental hacked – over 150,000 personal records breached appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/17/oregons-advantage-dental-hacked/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/Advantage-dental-hacked.jpg
VPNs illegal in UAE, says Dubai Police http://www.welivesecurity.com/2015/03/16/vpns-illegal-uae-says-dubai-police/ http://www.welivesecurity.com/2015/03/16/vpns-illegal-uae-says-dubai-police/#comments Mon, 16 Mar 2015 15:54:34 +0000 http://www.welivesecurity.com/?p=59924 A senior official in the Dubai Police force has stated that the use of Virtual Private Networks is illegal across the United Arab Emirates.

The post VPNs illegal in UAE, says Dubai Police appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/16/vpns-illegal-uae-says-dubai-police/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/UAE-flag.jpg
Hacker holds South Korean nuclear plant to ransom http://www.welivesecurity.com/2015/03/16/hacker-holds-south-korean-nuclear-plant-ransom/ http://www.welivesecurity.com/2015/03/16/hacker-holds-south-korean-nuclear-plant-ransom/#comments Mon, 16 Mar 2015 13:42:00 +0000 http://www.welivesecurity.com/?p=59916 A hacker who claims to have stolen sensitive data belonging to South Korea’s nuclear power plants is demanding money to keep the information private.

The post Hacker holds South Korean nuclear plant to ransom appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/16/hacker-holds-south-korean-nuclear-plant-ransom/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/hacker-south-korea-nuclear-plants-ransom.jpg
BBC website goes offline, but Jeremy Clarkson probably not to blame http://www.welivesecurity.com/2015/03/16/bbc-website-down-jeremy-clarkson/ http://www.welivesecurity.com/2015/03/16/bbc-website-down-jeremy-clarkson/#comments Mon, 16 Mar 2015 11:41:13 +0000 http://www.welivesecurity.com/?p=59891 This weekend, the BBC's website went offline. The first conclusion many people jump to? It must be the work of Anonymous hacktivists angry about the suspension of Jeremy Clarkson. But how likely is that?

The post BBC website goes offline, but Jeremy Clarkson probably not to blame appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/16/bbc-website-down-jeremy-clarkson/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/clarkson-623x425.jpeg
Women in Federal cybersecurity – How did they get their start? http://www.welivesecurity.com/2015/03/13/women-federal-cybersecurity-get-start/ http://www.welivesecurity.com/2015/03/13/women-federal-cybersecurity-get-start/#comments Fri, 13 Mar 2015 17:38:29 +0000 http://www.welivesecurity.com/?p=59882 While there may still be only a handful of women in Information Security, they can be found in increasing numbers in important, high-profile positions. In this post we look at how three women in Federal cybersecurity got their start.

The post Women in Federal cybersecurity – How did they get their start? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/13/women-federal-cybersecurity-get-start/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/LisaMonaco.jpg
Obama administration seeks more power to tackle botnets http://www.welivesecurity.com/2015/03/13/obama-administration-seeks-power-tackle-botnets/ http://www.welivesecurity.com/2015/03/13/obama-administration-seeks-power-tackle-botnets/#comments Fri, 13 Mar 2015 16:30:32 +0000 http://www.welivesecurity.com/?p=59850 The Obama administration wants greater power to shut down botnets, responding to the growing threat of cybercrime and increasingly complex, modern techniques.

The post Obama administration seeks more power to tackle botnets appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/13/obama-administration-seeks-power-tackle-botnets/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/obama-seeks-power-to-tackle-botnets.jpg
British Bank trials heartbeat based authentication http://www.welivesecurity.com/2015/03/13/british-bank-trials-heartbeat-based-authentication/ http://www.welivesecurity.com/2015/03/13/british-bank-trials-heartbeat-based-authentication/#comments Fri, 13 Mar 2015 16:28:03 +0000 http://www.welivesecurity.com/?p=59877 A British bank has been trialling a different type of biometrics, allowing their customers to confirm their identity via heartbeat according to the BBC.

The post British Bank trials heartbeat based authentication appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/13/british-bank-trials-heartbeat-based-authentication/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/Halifax-bank.jpg
Heimdal blog, 19 Experts, 50+ Security Tips http://www.welivesecurity.com/2015/03/13/heimdal-blog-19-experts-50-security-tips/ http://www.welivesecurity.com/2015/03/13/heimdal-blog-19-experts-50-security-tips/#comments Fri, 13 Mar 2015 15:00:48 +0000 http://www.welivesecurity.com/?p=59669 Heimdal asked a range of security experts for their essential security tips. 19 experts (including David Harley) offered over 50 tips.

The post Heimdal blog, 19 Experts, 50+ Security Tips appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/13/heimdal-blog-19-experts-50-security-tips/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/heimdal.png
Will Windows 10 leave enterprises vulnerable to zero-days? http://www.welivesecurity.com/2015/03/13/will-windows-10-leave-enterprises-vulnerable-zero-days/ http://www.welivesecurity.com/2015/03/13/will-windows-10-leave-enterprises-vulnerable-zero-days/#comments Fri, 13 Mar 2015 11:24:21 +0000 http://www.welivesecurity.com/?p=59853 One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

The post Will Windows 10 leave enterprises vulnerable to zero-days? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/13/will-windows-10-leave-enterprises-vulnerable-zero-days/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Windows-10-to-include-two-factor-authentication.jpg
The immortality of data (and people) in the digital age http://www.welivesecurity.com/2015/03/12/immortality-data-people-digital-age/ http://www.welivesecurity.com/2015/03/12/immortality-data-people-digital-age/#comments Thu, 12 Mar 2015 14:38:31 +0000 http://www.welivesecurity.com/?p=59801 In the future, everything around us will be managed by data, and those who have data will have power. So, will anonymity be possible (or desirable)?

The post The immortality of data (and people) in the digital age appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/12/immortality-data-people-digital-age/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/IMG_25091.jpg
Hackers phish for data with fake Apple Watch giveaway http://www.welivesecurity.com/2015/03/12/apple-watch-phishing-scam/ http://www.welivesecurity.com/2015/03/12/apple-watch-phishing-scam/#comments Thu, 12 Mar 2015 14:13:16 +0000 http://www.welivesecurity.com/?p=59777 Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.

The post Hackers phish for data with fake Apple Watch giveaway appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/12/apple-watch-phishing-scam/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/apple-watch-phishing-scam-phish.jpg
Google’s Project Zero reveals possible memory leak hack http://www.welivesecurity.com/2015/03/12/googles-project-zero-reveals-possible-memory-leak-hack/ http://www.welivesecurity.com/2015/03/12/googles-project-zero-reveals-possible-memory-leak-hack/#comments Thu, 12 Mar 2015 14:06:40 +0000 http://www.welivesecurity.com/?p=59787 Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.

The post Google’s Project Zero reveals possible memory leak hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/12/googles-project-zero-reveals-possible-memory-leak-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/Memory-leak.jpg
Superfish: Lenovo goes on the bloatware offensive http://www.welivesecurity.com/2015/03/12/superfish-lenovo-goes-bloatware-offensive/ http://www.welivesecurity.com/2015/03/12/superfish-lenovo-goes-bloatware-offensive/#comments Thu, 12 Mar 2015 10:41:38 +0000 http://www.welivesecurity.com/?p=59604 Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish's Visual Search adware on some of its popular consumer laptops during last year's holiday shopping season.

The post Superfish: Lenovo goes on the bloatware offensive appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/12/superfish-lenovo-goes-bloatware-offensive/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/lenovo-.jpg
The human cost of phone hacking http://www.welivesecurity.com/2015/03/11/human-cost-phone-hacking/ http://www.welivesecurity.com/2015/03/11/human-cost-phone-hacking/#comments Wed, 11 Mar 2015 20:46:07 +0000 http://www.welivesecurity.com/?p=59731 Phone hacking ruined the lives of celebrities, and - in at least one case - almost drove a victim to suicide.

The post The human cost of phone hacking appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/11/human-cost-phone-hacking/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/mirror-phone-hacking-623x425.jpeg
80 percent of global merchants fail card data security tests http://www.welivesecurity.com/2015/03/11/80-percent-global-merchants-fail-card-data-security-tests/ http://www.welivesecurity.com/2015/03/11/80-percent-global-merchants-fail-card-data-security-tests/#comments Wed, 11 Mar 2015 15:19:18 +0000 http://www.welivesecurity.com/?p=59678 Around 80 percent of global merchants including retailers, financial institutions and hospitality firms have failed interim tests which show they are not in compliance with card data security standards.

The post 80 percent of global merchants fail card data security tests appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/11/80-percent-global-merchants-fail-card-data-security-tests/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/card-security-verizon-report.jpg
Google Admin console email spoofing loophole patched http://www.welivesecurity.com/2015/03/11/google-admin-console-email-spoofing-loophole-patched/ http://www.welivesecurity.com/2015/03/11/google-admin-console-email-spoofing-loophole-patched/#comments Wed, 11 Mar 2015 14:39:51 +0000 http://www.welivesecurity.com/?p=59697 A vulnerability in Google Admin that could have allowed domains to be claimed to send out authentic seeming spoofed emails has been patched by the company, reports The Register.

The post Google Admin console email spoofing loophole patched appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/11/google-admin-console-email-spoofing-loophole-patched/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/Google-logo.jpg
US lawmakers want taxi apps to check driver fingerprints http://www.welivesecurity.com/2015/03/10/us-lawmakers-want-taxi-apps-check-driver-fingerprints/ http://www.welivesecurity.com/2015/03/10/us-lawmakers-want-taxi-apps-check-driver-fingerprints/#comments Tue, 10 Mar 2015 16:12:27 +0000 http://www.welivesecurity.com/?p=59628 Ride-sharing taxi apps Uber, Lyft and Sidecar have been asked by US lawmakers to adopt fingerprint-based background checks for their drivers,

The post US lawmakers want taxi apps to check driver fingerprints appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/10/us-lawmakers-want-taxi-apps-check-driver-fingerprints/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/01/biometric-fingerprint-security.jpg
US military looks to 3,000 new security hires by 2016 http://www.welivesecurity.com/2015/03/10/us-military-looks-3000-new-security-hires-2016/ http://www.welivesecurity.com/2015/03/10/us-military-looks-3000-new-security-hires-2016/#comments Tue, 10 Mar 2015 15:06:06 +0000 http://www.welivesecurity.com/?p=59622 The United States' military is looking to hire 3,000 cybersecurity professionals to man its infosec unit over the next nine months.

The post US military looks to 3,000 new security hires by 2016 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/10/us-military-looks-3000-new-security-hires-2016/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/us-military-cybersecurity.jpg
Operating System Vulnerabilities, Exploits and Insecurity http://www.welivesecurity.com/2015/03/10/operating-system-vulnerabilities-exploits-insecurity/ http://www.welivesecurity.com/2015/03/10/operating-system-vulnerabilities-exploits-insecurity/#comments Tue, 10 Mar 2015 13:40:48 +0000 http://www.welivesecurity.com/?p=59250 iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.

The post Operating System Vulnerabilities, Exploits and Insecurity appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/10/operating-system-vulnerabilities-exploits-insecurity/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/Betriebssysteme_Schwachstellen.jpg
CryptoFortress mimics TorrentLocker but is a different ransomware http://www.welivesecurity.com/2015/03/09/cryptofortress-mimics-torrentlocker-different-ransomware/ http://www.welivesecurity.com/2015/03/09/cryptofortress-mimics-torrentlocker-different-ransomware/#comments Mon, 09 Mar 2015 17:25:58 +0000 http://www.welivesecurity.com/?p=59551 ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

The post CryptoFortress mimics TorrentLocker but is a different ransomware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/09/cryptofortress-mimics-torrentlocker-different-ransomware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/ransomware-header.jpg
Three men indicted in ‘one of the largest’ data breaches in US history http://www.welivesecurity.com/2015/03/09/three-men-indicted-one-largest-data-breaches-us-history/ http://www.welivesecurity.com/2015/03/09/three-men-indicted-one-largest-data-breaches-us-history/#comments Mon, 09 Mar 2015 16:28:56 +0000 http://www.welivesecurity.com/?p=59540 The US Department of Justice has charged three men with what is being described as “one of the largest reported data breaches in US history,"

The post Three men indicted in ‘one of the largest’ data breaches in US history appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/03/09/three-men-indicted-one-largest-data-breaches-us-history/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/defendents-charged-email-stolen-data-breach.jpg