We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Mon, 22 Dec 2014 10:00:16 +0000 en-US hourly 1 Madonna thinks her computer was hacked http://www.welivesecurity.com/2014/12/22/madonna-computer-hack/ http://www.welivesecurity.com/2014/12/22/madonna-computer-hack/#comments Mon, 22 Dec 2014 10:00:16 +0000 http://www.welivesecurity.com/?p=55916 Turns out that the Material Girl has had her material stolen, and she's blaming hackers!

The post Madonna thinks her computer was hacked appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/22/madonna-computer-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/madonna-623x425.jpeg
Even skateboards can be hacked http://www.welivesecurity.com/2014/12/19/even-skateboards-can-hacked/ http://www.welivesecurity.com/2014/12/19/even-skateboards-can-hacked/#comments Fri, 19 Dec 2014 17:23:40 +0000 http://www.welivesecurity.com/?p=55909 It seems even the humble skateboard isn't immune to hacking, as The Register reports that the 'Boosted' brand of electric skateboards has been hacked by a pair of hackers.

The post Even skateboards can be hacked appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/19/even-skateboards-can-hacked/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Even-skateboards-can-be-hacked.jpg
Mobile security: flaw allows hackers to read texts and listen to calls http://www.welivesecurity.com/2014/12/19/mobile-security-flaw-allows-hackers-read-texts-listen-calls/ http://www.welivesecurity.com/2014/12/19/mobile-security-flaw-allows-hackers-read-texts-listen-calls/#comments Fri, 19 Dec 2014 13:45:26 +0000 http://www.welivesecurity.com/?p=55890 Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.

The post Mobile security: flaw allows hackers to read texts and listen to calls appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/19/mobile-security-flaw-allows-hackers-read-texts-listen-calls/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/falla_dispositivos_moviles.jpg
UK Office of Communications reveals nature of recent cyberattacks http://www.welivesecurity.com/2014/12/19/uk-office-communications-reveals-nature-recent-cyberattacks/ http://www.welivesecurity.com/2014/12/19/uk-office-communications-reveals-nature-recent-cyberattacks/#comments Fri, 19 Dec 2014 11:00:26 +0000 http://www.welivesecurity.com/?p=55887 A Freedom of Information request to the UK's Office of Communications has revealed exactly how persistent hackers are at attacking government departments in the country.

The post UK Office of Communications reveals nature of recent cyberattacks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/19/uk-office-communications-reveals-nature-recent-cyberattacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/hacker-keyboard.jpg
Target breach 12 months on: a year of lessons learned http://www.welivesecurity.com/2014/12/18/target-breach-lessons-learned/ http://www.welivesecurity.com/2014/12/18/target-breach-lessons-learned/#comments Thu, 18 Dec 2014 18:01:51 +0000 http://www.welivesecurity.com/?p=55564 The Target hack that was revealed one year ago today brought new levels of awareness to the problem of cybercrime. Today we review the case and its impact. To go straight to the lessons learned, click here. The Big One: Target “Nationwide retail giant Target is investigating a data breach potentially involving millions of customer

The post Target breach 12 months on: a year of lessons learned appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/18/target-breach-lessons-learned/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/target-lessons-learned.png
ICANN computers compromised by hackers http://www.welivesecurity.com/2014/12/18/icann-computers-compromised-hackers/ http://www.welivesecurity.com/2014/12/18/icann-computers-compromised-hackers/#comments Thu, 18 Dec 2014 17:01:00 +0000 http://www.welivesecurity.com/?p=55844 The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.

The post ICANN computers compromised by hackers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/18/icann-computers-compromised-hackers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/icann_ataque.jpg
Uber considers biometrics in bid to improve safety http://www.welivesecurity.com/2014/12/18/uber-considers-biometrics-bid-improve-safety/ http://www.welivesecurity.com/2014/12/18/uber-considers-biometrics-bid-improve-safety/#comments Thu, 18 Dec 2014 14:56:28 +0000 http://www.welivesecurity.com/?p=55802 The ride-sharing app Uber has unveiled new security plans to screen drivers, helping ensure passenger safety, Engadget reports.

The post Uber considers biometrics in bid to improve safety appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/18/uber-considers-biometrics-bid-improve-safety/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Uber-considers-biometrics-in-bid-to-improve-safety.jpg
Cybercrime Trends & Predictions for 2015 http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/ http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/#comments Thu, 18 Dec 2014 13:19:01 +0000 http://www.welivesecurity.com/?p=55597 As regular readers will know, every year we publish our predictions on cybercrime attacks for the year ahead. Well, our South American research team has spent the last few weeks putting together our predictions for 2015.

The post Cybercrime Trends & Predictions for 2015 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/18/cybercrime-trends-predictions-2015/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Image_Blog_Post_Trends20151.jpg
Webcam security – how to lock down the cameras in your home http://www.welivesecurity.com/2014/12/18/webcam-security-lock-cameras-home/ http://www.welivesecurity.com/2014/12/18/webcam-security-lock-cameras-home/#comments Thu, 18 Dec 2014 13:15:32 +0000 http://www.welivesecurity.com/?p=55779 Our tips will help you hacker-proof anything from baby monitors to surveillance cameras - and keep your home private.

The post Webcam security – how to lock down the cameras in your home appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/18/webcam-security-lock-cameras-home/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/rexfeatures_4264217a-e1418904931802.jpg
Dutch University unveils ‘fraud proof’ credit card concept http://www.welivesecurity.com/2014/12/17/dutch-university-unveils-fraud-proof-credit-card-concept/ http://www.welivesecurity.com/2014/12/17/dutch-university-unveils-fraud-proof-credit-card-concept/#comments Wed, 17 Dec 2014 17:13:05 +0000 http://www.welivesecurity.com/?p=55749 A Dutch university has reportedly made great steps towards making the dream of a 'fraud-proof' credit card a reality by utilizing quantum physics.

The post Dutch University unveils ‘fraud proof’ credit card concept appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/17/dutch-university-unveils-fraud-proof-credit-card-concept/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/credit-card-fraud.jpg
Delta Airlines security flaw exposes passengers’ boarding passes http://www.welivesecurity.com/2014/12/17/delta-airlines-security-flaw-exposes-passengers-boarding-passes/ http://www.welivesecurity.com/2014/12/17/delta-airlines-security-flaw-exposes-passengers-boarding-passes/#comments Wed, 17 Dec 2014 16:23:26 +0000 http://www.welivesecurity.com/?p=55743 A vulnerability at Delta Airlines which allowed customers to view any other passengers' electronic boarding passes has been fixed, reports Ubergizmo.

The post Delta Airlines security flaw exposes passengers’ boarding passes appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/17/delta-airlines-security-flaw-exposes-passengers-boarding-passes/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/delta-airlines.jpg
2014 Security Lessons: Making 2015 More Secure http://www.welivesecurity.com/2014/12/17/2014-security-lessons-making-2015-secure/ http://www.welivesecurity.com/2014/12/17/2014-security-lessons-making-2015-secure/#comments Wed, 17 Dec 2014 13:51:55 +0000 http://www.welivesecurity.com/?p=55590 A few days ago, I gave a webinar titled Make 2015 More Secure: Lessons from 2014, which was a follow-up to the 2014 Mid-Year Threat Report webinar from this summer.

The post 2014 Security Lessons: Making 2015 More Secure appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/17/2014-security-lessons-making-2015-secure/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/5457016581_f30e9afc98_z.jpg
TorrentLocker — Ransomware in a country near you http://www.welivesecurity.com/2014/12/16/torrentlocker-ransomware-in-a-country-near-you/ http://www.welivesecurity.com/2014/12/16/torrentlocker-ransomware-in-a-country-near-you/#comments Tue, 16 Dec 2014 14:30:28 +0000 http://www.welivesecurity.com/?p=55669 Today, we are publishing research on ransomware that emerged in 2014. We have posted blog articles about this threat before, to raise awareness when we realized the criminals were targeting the United Kingdom and Spain.

The post TorrentLocker — Ransomware in a country near you appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/16/torrentlocker-ransomware-in-a-country-near-you/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/torrentlocker_ransomware.jpg
Facebook scam: You won’t get a car for liking posts… http://www.welivesecurity.com/2014/12/16/facebook-scam-wont-get-car-liking-pages/ http://www.welivesecurity.com/2014/12/16/facebook-scam-wont-get-car-liking-pages/#comments Tue, 16 Dec 2014 14:17:18 +0000 http://www.welivesecurity.com/?p=55637 A new Facebook scam is doing the rounds promising users of the social network the chance to win a brand new car, if they only like and share a photo of the car tied up with a stylish gift ribbon.

The post Facebook scam: You won’t get a car for liking posts… appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/16/facebook-scam-wont-get-car-liking-pages/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/facebook-car-scam.jpg
TorrentLocker: Racketeering ransomware disassembled by ESET experts http://www.welivesecurity.com/2014/12/16/torrentlocker-racketeering-ransomware-disassembled-by-eset-experts/ http://www.welivesecurity.com/2014/12/16/torrentlocker-racketeering-ransomware-disassembled-by-eset-experts/#comments Tue, 16 Dec 2014 13:32:27 +0000 http://www.welivesecurity.com/?p=55487 Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.

The post TorrentLocker: Racketeering ransomware disassembled by ESET experts appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/16/torrentlocker-racketeering-ransomware-disassembled-by-eset-experts/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/torrentlocker.jpeg
Hypercom payment terminals bricked… but not by malware http://www.welivesecurity.com/2014/12/15/hypercom-payment-terminals-bricked-malware/ http://www.welivesecurity.com/2014/12/15/hypercom-payment-terminals-bricked-malware/#comments Mon, 15 Dec 2014 17:31:11 +0000 http://www.welivesecurity.com/?p=55620 When 'several thousand' payment terminals across the country stopped working last week, it would be easy to jump to the conclusion that some malicious malware was on the loose, but the truth had nothing to do with cybercriminals, Brian Krebs of Krebs on Security explains.

The post Hypercom payment terminals bricked… but not by malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/15/hypercom-payment-terminals-bricked-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/US-payment-terminals-bricked...-but-not-by-malware.jpg
FBI warns hacker groups are targeting US energy firms http://www.welivesecurity.com/2014/12/15/fbi-warns-hacker-groups-targeting-us-energy-firms/ http://www.welivesecurity.com/2014/12/15/fbi-warns-hacker-groups-targeting-us-energy-firms/#comments Mon, 15 Dec 2014 17:08:40 +0000 http://www.welivesecurity.com/?p=55614 The FBI has issued a warning to American businesses, encouraging them to be on high alert for Iranian hacking groups targeting energy and defense firms as well as educational institutions.

The post FBI warns hacker groups are targeting US energy firms appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/15/fbi-warns-hacker-groups-targeting-us-energy-firms/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/07/androidsimplocker-fbi.jpg
FBI outlines proposals for dealing with cybercrime to Congress http://www.welivesecurity.com/2014/12/12/fbi-outlines-proposals-dealing-cybercrime-congress/ http://www.welivesecurity.com/2014/12/12/fbi-outlines-proposals-dealing-cybercrime-congress/#comments Fri, 12 Dec 2014 16:45:52 +0000 http://www.welivesecurity.com/?p=55555 Joseph Demarest, assistant director at the FBI, has been testifying on the threats of cybercrime to a Senate Committee on Banking, Housing and Urban Affairs, and Network World reports that the agency has three specific recommendations of how Congress could assist with the ever-evolving problem.

The post FBI outlines proposals for dealing with cybercrime to Congress appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/12/fbi-outlines-proposals-dealing-cybercrime-congress/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/FBI-outlines-proposals-for-dealing-with-cybercrime-to-Congress.jpg
POODLE vulnerability found to also bite TLS encryption http://www.welivesecurity.com/2014/12/12/poodle-vulnerability-found-also-bite-tls-encryption/ http://www.welivesecurity.com/2014/12/12/poodle-vulnerability-found-also-bite-tls-encryption/#comments Fri, 12 Dec 2014 15:21:53 +0000 http://www.welivesecurity.com/?p=55540 When it was first uncovered back in October, researchers believed that only sites using SSL 3.0 were vulnerable to the POODLE, but now it appears certain implementations of TLS could be compromised using a similar exploit, according to ZDNet.

The post POODLE vulnerability found to also bite TLS encryption appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/12/poodle-vulnerability-found-also-bite-tls-encryption/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/POODLE-vulnerability-found-to-also-bite-TLS-encryption.jpg
Facebook hoax – how to tell instantly if a story is fake http://www.welivesecurity.com/2014/12/12/facebook-hoax/ http://www.welivesecurity.com/2014/12/12/facebook-hoax/#comments Fri, 12 Dec 2014 14:17:37 +0000 http://www.welivesecurity.com/?p=55511 Two-thirds of young people first learn about major news events via Facebook - but as cybercriminals cash in with hoax stories and links, it can be difficult to tell 'real' content from fake. Our tips can help.

The post Facebook hoax – how to tell instantly if a story is fake appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/12/facebook-hoax/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/facebookmain.jpg
Charge Anywhere warns of payment data leak http://www.welivesecurity.com/2014/12/11/charge-anywhere-warns-payment-data-leak/ http://www.welivesecurity.com/2014/12/11/charge-anywhere-warns-payment-data-leak/#comments Thu, 11 Dec 2014 15:33:03 +0000 http://www.welivesecurity.com/?p=55484 Mobile payment platform Charge Anywhere has revealed an exploit in its software that means that five year's worth of credit card data could be at risk.

The post Charge Anywhere warns of payment data leak appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/11/charge-anywhere-warns-payment-data-leak/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/credit-card-fraud.jpg
Android scam: Firms fined over $500,000 for malicious apps’ hidden subscriptions http://www.welivesecurity.com/2014/12/11/android-scam-firms-fined-500000-malicious-apps-hidden-subscriptions/ http://www.welivesecurity.com/2014/12/11/android-scam-firms-fined-500000-malicious-apps-hidden-subscriptions/#comments Thu, 11 Dec 2014 13:17:36 +0000 http://www.welivesecurity.com/?p=55473 Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.

The post Android scam: Firms fined over $500,000 for malicious apps’ hidden subscriptions appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/11/android-scam-firms-fined-500000-malicious-apps-hidden-subscriptions/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/103385722_f0d6e8ce50_z.jpg
Privacy focused Blackphone app store in development http://www.welivesecurity.com/2014/12/10/privacy-focused-blackphone-app-store-development/ http://www.welivesecurity.com/2014/12/10/privacy-focused-blackphone-app-store-development/#comments Wed, 10 Dec 2014 10:19:55 +0000 http://www.welivesecurity.com/?p=55428 Blackphone - the Android smartphone that pushes privacy and security above all else - is to open an app store set to rival the Google Play marketplace.

The post Privacy focused Blackphone app store in development appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/10/privacy-focused-blackphone-app-store-development/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/07/blackphone.jpg
Advertising fraud: a quarter of digital ads stolen by cybercriminals’ bots http://www.welivesecurity.com/2014/12/10/advertising-fraud-quarter-digital-ads-stolen-cybercriminals-bots/ http://www.welivesecurity.com/2014/12/10/advertising-fraud-quarter-digital-ads-stolen-cybercriminals-bots/#comments Wed, 10 Dec 2014 09:22:05 +0000 http://www.welivesecurity.com/?p=55384 Nearly a quarter of digital advert impressions are faked, according to a new study. This advertising fraud is set to cost advertisers $6.3 billion in the next year, reports Channel Eye.

The post Advertising fraud: a quarter of digital ads stolen by cybercriminals’ bots appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/10/advertising-fraud-quarter-digital-ads-stolen-cybercriminals-bots/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/powerpoint_malware.jpg
Trust, Truth and Hoaxes in Social Media http://www.welivesecurity.com/2014/12/09/trust-truth-hoaxes-social-media/ http://www.welivesecurity.com/2014/12/09/trust-truth-hoaxes-social-media/#comments Tue, 09 Dec 2014 17:07:09 +0000 http://www.welivesecurity.com/?p=55394 Social networks are fun, but can also spread misinformation and worse. We discuss myths about your contract with Facebook, and whether British politicians are interested only in their own salaries.

The post Trust, Truth and Hoaxes in Social Media appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/09/trust-truth-hoaxes-social-media/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/nativity-hoax.png
Company data at risk by widespread employee access http://www.welivesecurity.com/2014/12/09/company-data-risk-widespread-employee-access/ http://www.welivesecurity.com/2014/12/09/company-data-risk-widespread-employee-access/#comments Tue, 09 Dec 2014 12:35:39 +0000 http://www.welivesecurity.com/?p=55380 A large number of companies are leaving their confidential files at risk by over-sharing with employees, according to a new survey by the Ponemon Institute.

The post Company data at risk by widespread employee access appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/09/company-data-risk-widespread-employee-access/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Company-data-at-risk-by-widespread-employee-access.jpg
Bebe clothing store suffers payment card breach http://www.welivesecurity.com/2014/12/09/bebe-clothing-store-suffers-payment-card-breach/ http://www.welivesecurity.com/2014/12/09/bebe-clothing-store-suffers-payment-card-breach/#comments Tue, 09 Dec 2014 11:22:59 +0000 http://www.welivesecurity.com/?p=55372 The clothing chain Bebe has been the latest company to suffer a breach of payment card information to hackers, reports PC World.

The post Bebe clothing store suffers payment card breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/09/bebe-clothing-store-suffers-payment-card-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/bebe-card-data-hacked.jpg
Sony Pictures hacking traced to Thai hotel as North Korea denies involvement http://www.welivesecurity.com/2014/12/08/sony-pictures-hacking-traced-thai-hotel-north-korea-denies-involvement/ http://www.welivesecurity.com/2014/12/08/sony-pictures-hacking-traced-thai-hotel-north-korea-denies-involvement/#comments Mon, 08 Dec 2014 17:48:48 +0000 http://www.welivesecurity.com/?p=55338 The identity of the Sony Pictures hackers who attacked last week remains a mystery, but we have an alleged location where the attack was masterminded from, according to a report from Bloomberg.

The post Sony Pictures hacking traced to Thai hotel as North Korea denies involvement appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/08/sony-pictures-hacking-traced-thai-hotel-north-korea-denies-involvement/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Sony-Pictures-hacking.jpg
Tor a major source of bank fraud, says US Treasury Dept. http://www.welivesecurity.com/2014/12/08/tor-major-source-bank-fraud-says-us-treasury-dept/ http://www.welivesecurity.com/2014/12/08/tor-major-source-bank-fraud-says-us-treasury-dept/#comments Mon, 08 Dec 2014 17:22:13 +0000 http://www.welivesecurity.com/?p=55362 Tor has been used to mask the identities of cybercriminals in a significant number of bank frauds for over a decade, according to a US Treasury Department report obtained by Brian Krebs on his Krebs on Security website.

The post Tor a major source of bank fraud, says US Treasury Dept. appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/08/tor-major-source-bank-fraud-says-us-treasury-dept/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Tor-a-major-source-of-bank-fraud-says-US-Treasury-Dept..jpg
Identity theft – six tips to help keep yours safe http://www.welivesecurity.com/2014/12/08/identity-theft/ http://www.welivesecurity.com/2014/12/08/identity-theft/#comments Mon, 08 Dec 2014 13:47:41 +0000 http://www.welivesecurity.com/?p=55328 Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves - if not more so. Lock yours down with our tips.

The post Identity theft – six tips to help keep yours safe appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/08/identity-theft/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/robo_identidad.jpg
US announces new cybersecurity unit with a focus on prevention http://www.welivesecurity.com/2014/12/05/us-announces-new-cybersecurity-unit-focus-prevention/ http://www.welivesecurity.com/2014/12/05/us-announces-new-cybersecurity-unit-focus-prevention/#comments Fri, 05 Dec 2014 18:01:03 +0000 http://www.welivesecurity.com/?p=55311 The Department of Justice has announced that it is creating a dedicated cybersecurity unit, with an eye on prevention rather, reports Gizmodo.

The post US announces new cybersecurity unit with a focus on prevention appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/05/us-announces-new-cybersecurity-unit-focus-prevention/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/department-of-justice.jpg
Sony Pictures hacking exposed Hollywood stars’ personal data http://www.welivesecurity.com/2014/12/05/sony-pictures-hacking-exposed-hollywood-stars-personal-data/ http://www.welivesecurity.com/2014/12/05/sony-pictures-hacking-exposed-hollywood-stars-personal-data/#comments Fri, 05 Dec 2014 15:15:47 +0000 http://www.welivesecurity.com/?p=55298 The fallout from Sony Pictures' hacking continued today, with the Wall Street Journal reporting that 47,000 sets of personal details have been posted online.

The post Sony Pictures hacking exposed Hollywood stars’ personal data appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/05/sony-pictures-hacking-exposed-hollywood-stars-personal-data/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Sylvestor-Stalone-hacked.jpg
How to delete yourself from Google Search http://www.welivesecurity.com/videos/delete-google-search/ http://www.welivesecurity.com/videos/delete-google-search/#comments Fri, 05 Dec 2014 10:49:07 +0000 http://www.welivesecurity.com/?post_type=post_video&p=55247 Deleting yourself from Google is not quite as simple as pressing a button, but you can manage your digital footprint by following these 5 simple steps.

The post How to delete yourself from Google Search appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/delete-google-search/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/019.jpg
PayPal bug bounty catches account-hijacking vulnerability http://www.welivesecurity.com/2014/12/04/paypal-bug-bounty-catches-account-hijacking-vulnerability/ http://www.welivesecurity.com/2014/12/04/paypal-bug-bounty-catches-account-hijacking-vulnerability/#comments Thu, 04 Dec 2014 17:16:08 +0000 http://www.welivesecurity.com/?p=55274 Popular internet payment provider PayPal has fixed an exploit that would have allowed hackers to take over an account with a single click, reports The Register.

The post PayPal bug bounty catches account-hijacking vulnerability appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/04/paypal-bug-bounty-catches-account-hijacking-vulnerability/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Paypal.jpg
Firefox 34 disables SSL 3.0 and tackles eight security fixes http://www.welivesecurity.com/2014/12/04/firefox-34-disables-ssl-3-0-in-new-version/ http://www.welivesecurity.com/2014/12/04/firefox-34-disables-ssl-3-0-in-new-version/#comments Thu, 04 Dec 2014 16:29:45 +0000 http://www.welivesecurity.com/?p=55257 Firefox 34, the latest version of the Mozilla's popular web browser has disabled support for SSL 3.0 in reaction to the POODLE exploit, reported by We Live Security back in October.

The post Firefox 34 disables SSL 3.0 and tackles eight security fixes appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/04/firefox-34-disables-ssl-3-0-in-new-version/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Firefox-update.jpg
How to spot a Kickstarter scam http://www.welivesecurity.com/videos/spot-kickstarter-scam-2/ http://www.welivesecurity.com/videos/spot-kickstarter-scam-2/#comments Thu, 04 Dec 2014 10:45:45 +0000 http://www.welivesecurity.com/?post_type=post_video&p=55244 Crowd funding sites are full of great ideas, but can also be a hot bed of scams. Stay safe with these top 5 tips.

The post How to spot a Kickstarter scam appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/spot-kickstarter-scam-2/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/015.jpg
Iranian hackers targeted transport, energy and infrastructure firms http://www.welivesecurity.com/2014/12/03/iranian-hackers-targeted-transport-energy-infrastructure-firms/ http://www.welivesecurity.com/2014/12/03/iranian-hackers-targeted-transport-energy-infrastructure-firms/#comments Wed, 03 Dec 2014 17:30:02 +0000 http://www.welivesecurity.com/?p=55202 An Iranian hacker group has been breaching computer networks of 50 of the world's biggest energy, transport and infrastructure groups for the last two years, reports Tech Spot.

The post Iranian hackers targeted transport, energy and infrastructure firms appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/03/iranian-hackers-targeted-transport-energy-infrastructure-firms/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/hacker-exploit-kit.jpg
Sony hacking: were PlayStation servers used to spread stolen data? http://www.welivesecurity.com/2014/12/03/sony-hacking-playstation-servers-used-spread-stolen-data/ http://www.welivesecurity.com/2014/12/03/sony-hacking-playstation-servers-used-spread-stolen-data/#comments Wed, 03 Dec 2014 14:18:24 +0000 http://www.welivesecurity.com/?p=55185 Following the release of confidential documents and four unreleased films, as reported by We Live Security here, the bad news for Sony continued as it was reported that the company's own PlayStation servers were used to distribute the stolen data, The Independent reports.

The post Sony hacking: were PlayStation servers used to spread stolen data? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/03/sony-hacking-playstation-servers-used-spread-stolen-data/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Playstation.jpg
Top 5 tips for avoiding ATM scams http://www.welivesecurity.com/videos/top-5-tips-avoiding-atm-scams/ http://www.welivesecurity.com/videos/top-5-tips-avoiding-atm-scams/#comments Wed, 03 Dec 2014 12:17:40 +0000 http://www.welivesecurity.com/?post_type=post_video&p=55180 ATM scams can come in a variety of forms, so make sure to keep your guard up by following these 5 simple tips.

The post Top 5 tips for avoiding ATM scams appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/top-5-tips-avoiding-atm-scams/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/013.jpg
Top 5 things to consider when buying pre owned tech http://www.welivesecurity.com/videos/top-5-things-consider-buying-pre-owned-tech/ http://www.welivesecurity.com/videos/top-5-things-consider-buying-pre-owned-tech/#comments Wed, 03 Dec 2014 12:14:57 +0000 http://www.welivesecurity.com/?post_type=post_video&p=55177 Buying used electric goods may be a economical alternative, but it can also be a security risk. Follow these 5 tips for safer shopping.

The post Top 5 things to consider when buying pre owned tech appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/top-5-things-consider-buying-pre-owned-tech/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/012.jpg
Sony Pictures hacking: Five films leak online http://www.welivesecurity.com/2014/12/02/sony-pictures-hacking-five-films-leak-online/ http://www.welivesecurity.com/2014/12/02/sony-pictures-hacking-five-films-leak-online/#comments Tue, 02 Dec 2014 14:25:28 +0000 http://www.welivesecurity.com/?p=55114 The recently released Brad Pitt film 'Fury' was amongst the titles leaked, but others were yet to be released formally be the studio, including 'Annie', 'Still Alice', 'Mr. Turner', and 'To Write Love On Her Arms."

The post Sony Pictures hacking: Five films leak online appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/02/sony-pictures-hacking-five-films-leak-online/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/Five-Sony-films-leak-online-following-hacking.jpg
Phone biometric security need to be controlled, says ex-GCHQ chief http://www.welivesecurity.com/2014/12/01/phone-biometric-security-need-controlled-says-ex-gchq-chief/ http://www.welivesecurity.com/2014/12/01/phone-biometric-security-need-controlled-says-ex-gchq-chief/#comments Mon, 01 Dec 2014 17:32:12 +0000 http://www.welivesecurity.com/?p=55105 The former head of the UK's government's communications agency GCHQ has issued warnings over the privacy of the biometric security increasingly favored in top-end mobile phones and other devices, Computing reports.

The post Phone biometric security need to be controlled, says ex-GCHQ chief appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/01/phone-biometric-security-need-controlled-says-ex-gchq-chief/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Touch-ID.jpg
UK police need to ‘catch up’ with cybercrime threat http://www.welivesecurity.com/2014/12/01/uk-police-need-catch-cybercrime-threat/ http://www.welivesecurity.com/2014/12/01/uk-police-need-catch-cybercrime-threat/#comments Mon, 01 Dec 2014 17:01:49 +0000 http://www.welivesecurity.com/?p=55099 Police in the UK are facing an uphill struggle to deal with modern threats and cybercrime, reports the BBC, with the current methods involving "policing the crimes of today with the methods of yesterday."

The post UK police need to ‘catch up’ with cybercrime threat appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/12/01/uk-police-need-catch-cybercrime-threat/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/metropolitan-police.jpg
Cyber Monday: Costco and Home Depot phishing emails target shoppers http://www.welivesecurity.com/2014/11/30/costco-home-depot-phishing-emails-target-cyber-monday-shoppers/ http://www.welivesecurity.com/2014/11/30/costco-home-depot-phishing-emails-target-cyber-monday-shoppers/#comments Sun, 30 Nov 2014 12:59:10 +0000 http://www.welivesecurity.com/?p=55068 Thanksgiving Day phishing emails leverage this popular American holiday to target consumers who shop at The Home Depot and Costco. Here's what to watch for, and advice on how to handle such messages.

The post Cyber Monday: Costco and Home Depot phishing emails target shoppers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/30/costco-home-depot-phishing-emails-target-cyber-monday-shoppers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/home-depot-costco-phish.png
5 must do’s for a safer Cyber Monday http://www.welivesecurity.com/videos/5-must-dos-safer-cyber-monday/ http://www.welivesecurity.com/videos/5-must-dos-safer-cyber-monday/#comments Sun, 30 Nov 2014 10:33:43 +0000 http://www.welivesecurity.com/?post_type=post_video&p=55239 With so many retailers offering great deals online, its important to be extra wary of cyber criminals looking to take advantage. Keep in mind these 5 must dos on Cyber Monday.

The post 5 must do’s for a safer Cyber Monday appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/5-must-dos-safer-cyber-monday/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/015.jpg
League of Legends Bug Bounty Scheme has awarded over $100k http://www.welivesecurity.com/2014/11/28/league-legends-bug-bounty-scheme-awarded-100k/ http://www.welivesecurity.com/2014/11/28/league-legends-bug-bounty-scheme-awarded-100k/#comments Fri, 28 Nov 2014 17:28:18 +0000 http://www.welivesecurity.com/?p=55050 Riot Games, the creator of League of Legends, has paid out over $100,000 to security researchers poring over the game looking for exploits, hacks and bugs, Security Week reports.

The post League of Legends Bug Bounty Scheme has awarded over $100k appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/28/league-legends-bug-bounty-scheme-awarded-100k/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/League-of-Legends-Creators-Unveil-Details-of-Bug-Bounty-Program.jpg
Healthcare security needs investment to stave off cyberattacks, says report http://www.welivesecurity.com/2014/11/28/healthcare-security-needs-investment-stave-cyberattacks-says-report/ http://www.welivesecurity.com/2014/11/28/healthcare-security-needs-investment-stave-cyberattacks-says-report/#comments Fri, 28 Nov 2014 16:51:59 +0000 http://www.welivesecurity.com/?p=55035 A new report from IDC Health Insights claims that healthcare firms need to invest to ensure protections from cyberattacks, according to the Computing website.

The post Healthcare security needs investment to stave off cyberattacks, says report appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/28/healthcare-security-needs-investment-stave-cyberattacks-says-report/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Healthcare-firms-need-to-invest-to-stave-off-cyber-attacks-says-IDC.jpg
Infographic: Cyber Monday – Everything you need to know http://www.welivesecurity.com/2014/11/28/infographic-cyber-monday-everything-need-know/ http://www.welivesecurity.com/2014/11/28/infographic-cyber-monday-everything-need-know/#comments Fri, 28 Nov 2014 14:52:53 +0000 http://www.welivesecurity.com/?p=55029 Cyber Monday is one of the biggest shopping days in the year, and in 2013 a massive $2.3bn was spent on shoppers getting their Christmas bargains in. Where this kind of money is flowing, cybercriminals are also around though, as this infographic shows.

The post Infographic: Cyber Monday – Everything you need to know appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/28/infographic-cyber-monday-everything-need-know/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Cyber-Monday-v06-WeLiveSecurity1.png
News websites hacked with ‘Syrian Electronic Army’ pop-up http://www.welivesecurity.com/2014/11/28/news-websites-hacked-syrian-electronic-army-pop/ http://www.welivesecurity.com/2014/11/28/news-websites-hacked-syrian-electronic-army-pop/#comments Fri, 28 Nov 2014 14:40:55 +0000 http://www.welivesecurity.com/?p=55023 A Thanksgiving attack across many Western news and information websites left visitors facing javascript pop-ups telling them they had been hacked by the Syrian Electronic Army, according to CNET.

The post News websites hacked with ‘Syrian Electronic Army’ pop-up appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/28/news-websites-hacked-syrian-electronic-army-pop/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/powerpoint-malware.jpg
Gamer PCs – how to keep yours clean and mean http://www.welivesecurity.com/2014/11/28/gamer-pcs/ http://www.welivesecurity.com/2014/11/28/gamer-pcs/#comments Fri, 28 Nov 2014 14:00:13 +0000 http://www.welivesecurity.com/?p=54924 Gamers have become major targets for hackers - from large-scale attacks against gaming companies, to small-scale scams carried out via game chat channels. But a few easy security steps should help keep your precious rig at full speed - and safe.

The post Gamer PCs – how to keep yours clean and mean appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/28/gamer-pcs/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Advanced-Warfare-21.jpg