We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Tue, 30 Jun 2015 16:25:43 +0000 en-US hourly 1 US suspends background checks system after flaw found http://www.welivesecurity.com/2015/06/30/us-suspends-background-checks-system-flaw-found/ http://www.welivesecurity.com/2015/06/30/us-suspends-background-checks-system-flaw-found/#comments Tue, 30 Jun 2015 16:25:43 +0000 http://www.welivesecurity.com/?p=64981 An entire US department program is to be suspended in order to fix vulnerabilities discovered during a security audit.

The post US suspends background checks system after flaw found appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/30/us-suspends-background-checks-system-flaw-found/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/background_checks_US_EQIP.jpg
Dino – the latest spying malware from an allegedly French espionage group analyzed http://www.welivesecurity.com/2015/06/30/dino-spying-malware-analyzed/ http://www.welivesecurity.com/2015/06/30/dino-spying-malware-analyzed/#comments Tue, 30 Jun 2015 11:12:33 +0000 http://www.welivesecurity.com/?p=64883 In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous Casper, Bunny and Babar malware.

The post Dino – the latest spying malware from an allegedly French espionage group analyzed appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/30/dino-spying-malware-analyzed/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/Harikalar_Diyari_Flintstones_06029_nevit-623x4101.jpg
ICANN policy changes trigger privacy concerns http://www.welivesecurity.com/2015/06/29/icann-policy-changes-trigger-privacy-concerns/ http://www.welivesecurity.com/2015/06/29/icann-policy-changes-trigger-privacy-concerns/#comments Mon, 29 Jun 2015 13:10:49 +0000 http://www.welivesecurity.com/?p=64873 Internet name authority ICANN has unsettled privacy advocates after a new working group document flagged changes to the way domain proxy services can operate.

The post ICANN policy changes trigger privacy concerns appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/29/icann-policy-changes-trigger-privacy-concerns/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/icann_privacy_610-623x4101.jpg
Cisco warns of default SSH key in several products http://www.welivesecurity.com/2015/06/26/cisco-warns-default-ssh-key-several-products/ http://www.welivesecurity.com/2015/06/26/cisco-warns-default-ssh-key-several-products/#comments Fri, 26 Jun 2015 14:33:16 +0000 http://www.welivesecurity.com/?p=64833 Cisco security engineers have disclosed that there is a single default ‘maintenance’ SSH key hardcoded into several families of Cisco security appliances.

The post Cisco warns of default SSH key in several products appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/26/cisco-warns-default-ssh-key-several-products/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/cisco_security_backdoor_610.jpg
Phone Scams: Increasing Numbers, Wider Scope http://www.welivesecurity.com/2015/06/26/phone-scams-increasing-numbers-wider-scope/ http://www.welivesecurity.com/2015/06/26/phone-scams-increasing-numbers-wider-scope/#comments Fri, 26 Jun 2015 10:08:23 +0000 http://www.welivesecurity.com/?p=64723 There's a lot more to phone scams than tech support, giving rise to an escalating number of complaints. Here's what two recent reports tell us.

The post Phone Scams: Increasing Numbers, Wider Scope appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/26/phone-scams-increasing-numbers-wider-scope/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/utility-pole.jpg
4 tips for recovering from an attack http://www.welivesecurity.com/2015/06/25/recover-hack/ http://www.welivesecurity.com/2015/06/25/recover-hack/#comments Thu, 25 Jun 2015 16:03:47 +0000 http://www.welivesecurity.com/?p=64794 Recent high-profile data breaches have illustrated criminals’ insatiable appetite for data and financial reward. Here's some information on what to do after an attack.

The post 4 tips for recovering from an attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/25/recover-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/how-recover-hack-1.jpg
New iPhone update blocks apps from seeing other apps you’ve installed http://www.welivesecurity.com/2015/06/25/new-iphone-update-blocks-apps-seeing-apps-youve-installed/ http://www.welivesecurity.com/2015/06/25/new-iphone-update-blocks-apps-seeing-apps-youve-installed/#comments Thu, 25 Jun 2015 15:29:46 +0000 http://www.welivesecurity.com/?p=64783 Apple will reportedly introduce a new privacy update for the iPhone that will prevent installed iOS apps from seeing which other apps have been downloaded to the device.

The post New iPhone update blocks apps from seeing other apps you’ve installed appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/25/new-iphone-update-blocks-apps-seeing-apps-youve-installed/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/apple-update-apps.jpg
Spiceworks application vulnerability disclosed http://www.welivesecurity.com/2015/06/25/spiceworks-application-vulnerability-disclosed/ http://www.welivesecurity.com/2015/06/25/spiceworks-application-vulnerability-disclosed/#comments Thu, 25 Jun 2015 14:05:07 +0000 http://www.welivesecurity.com/?p=64764 A serious flaw has been discovered in the Spiceworks application, which creates an admin account for anyone logging in using their Facebook or LinkedIn details.

The post Spiceworks application vulnerability disclosed appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/25/spiceworks-application-vulnerability-disclosed/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/Social_hack-610.jpg
Critical vulnerabilities in Windows and Adobe Reader exposed by hacker http://www.welivesecurity.com/2015/06/24/critical-vulnerabilities-windows-adobe-reader-exposed-hacker/ http://www.welivesecurity.com/2015/06/24/critical-vulnerabilities-windows-adobe-reader-exposed-hacker/#comments Wed, 24 Jun 2015 14:28:11 +0000 http://www.welivesecurity.com/?p=64700 A hacker has published an extensive list of Adobe Reader and Windows vulnerabilities based on his research into a relatively obscure area of font management.

The post Critical vulnerabilities in Windows and Adobe Reader exposed by hacker appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/24/critical-vulnerabilities-windows-adobe-reader-exposed-hacker/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/Dangerous_keyboard_610.jpg
How to steal PGP encryption keys (using radio waves and pita bread) http://www.welivesecurity.com/2015/06/23/pgp-encryption-keys-pita/ http://www.welivesecurity.com/2015/06/23/pgp-encryption-keys-pita/#comments Tue, 23 Jun 2015 14:11:47 +0000 http://www.welivesecurity.com/?p=64652 An ingenious team of Israeli security researchers at Tel Aviv University have discovered a way to steal secret encryption keys using a gadget so small it can be hidden inside some pita bread.

The post How to steal PGP encryption keys (using radio waves and pita bread) appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/23/pgp-encryption-keys-pita/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/pita-623x425.jpeg
The role of proxies and protocols in malware investigations http://www.welivesecurity.com/2015/06/23/role-proxies-protocols-malware-investigations/ http://www.welivesecurity.com/2015/06/23/role-proxies-protocols-malware-investigations/#comments Tue, 23 Jun 2015 12:49:50 +0000 http://www.welivesecurity.com/?p=64363 What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?

The post The role of proxies and protocols in malware investigations appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/23/role-proxies-protocols-malware-investigations/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/proxy_protocolo_servidor-623x427.jpg
Minor Chrome release fixes serious bugs http://www.welivesecurity.com/2015/06/23/minor-chrome-release-fixes-serious-bugs/ http://www.welivesecurity.com/2015/06/23/minor-chrome-release-fixes-serious-bugs/#comments Tue, 23 Jun 2015 12:30:59 +0000 http://www.welivesecurity.com/?p=64637 Google has updated the Chrome browser to version 43.0.2357.130 for Windows, Mac, and Linux.

The post Minor Chrome release fixes serious bugs appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/23/minor-chrome-release-fixes-serious-bugs/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/Chrome_update_610.jpg
Polish airline LOT grounded by ‘first attack of its kind’ http://www.welivesecurity.com/2015/06/22/polish-airline-lot-grounded-first-attack-kind/ http://www.welivesecurity.com/2015/06/22/polish-airline-lot-grounded-first-attack-kind/#comments Mon, 22 Jun 2015 15:03:06 +0000 http://www.welivesecurity.com/?p=64578 Hackers are being blamed for an attack which grounded 1,400 passengers set to fly on Polish airline LOT.

The post Polish airline LOT grounded by ‘first attack of its kind’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/22/polish-airline-lot-grounded-first-attack-kind/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/ground_control_hacked-623x4101.jpg
LinkedIn to stick with invite-only bug bounty program http://www.welivesecurity.com/2015/06/19/linkedin-stick-invite-bug-bounty-program/ http://www.welivesecurity.com/2015/06/19/linkedin-stick-invite-bug-bounty-program/#comments Fri, 19 Jun 2015 15:28:46 +0000 http://www.welivesecurity.com/?p=64548 LinkedIn will continue a bug bounty program that pays out to a closed group of security researchers, claiming that an invite-only approach reduces the number of irrelevant reports.

The post LinkedIn to stick with invite-only bug bounty program appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/19/linkedin-stick-invite-bug-bounty-program/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/shutterstock_262392020.jpg
Reddit goes HTTPS, joins Wikipedia at security table http://www.welivesecurity.com/2015/06/19/reddit-goes-https-joins-wikipedia-security-table/ http://www.welivesecurity.com/2015/06/19/reddit-goes-https-joins-wikipedia-security-table/#comments Fri, 19 Jun 2015 14:35:38 +0000 http://www.welivesecurity.com/?p=64538 Popular meme site Reddit has announced that it will soon encrypt all traffic with HTTPS by default.

The post Reddit goes HTTPS, joins Wikipedia at security table appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/19/reddit-goes-https-joins-wikipedia-security-table/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/12/https_chrome.jpg
Cyber Boot Camp: a head start for tomorrow’s cyber workforce http://www.welivesecurity.com/2015/06/18/cyber-boot-camp-head-start-tomorrows-cyber-workforce/ http://www.welivesecurity.com/2015/06/18/cyber-boot-camp-head-start-tomorrows-cyber-workforce/#comments Thu, 18 Jun 2015 17:10:03 +0000 http://www.welivesecurity.com/?p=64436 Every June, a select group of students from high schools and middle schools in San Diego County, California, get five days of intense education in the art of defending computer systems.

The post Cyber Boot Camp: a head start for tomorrow’s cyber workforce appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/18/cyber-boot-camp-head-start-tomorrows-cyber-workforce/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/cbc-san-diego.jpg
Apple iOS and OS X flaws leave passwords vulnerable http://www.welivesecurity.com/2015/06/18/apple-ios-os-x-flaws-leave-passwords-vulnerable/ http://www.welivesecurity.com/2015/06/18/apple-ios-os-x-flaws-leave-passwords-vulnerable/#comments Thu, 18 Jun 2015 16:02:47 +0000 http://www.welivesecurity.com/?p=64427 A vulnerability found in Apple's iOS and OS X devices could allow hackers to upload malware and steal passwords for services including Mail and iCloud

The post Apple iOS and OS X flaws leave passwords vulnerable appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/18/apple-ios-os-x-flaws-leave-passwords-vulnerable/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/apple-flaws-ios-vulnerability.jpg
Must-know security tips for non-technical fathers http://www.welivesecurity.com/2015/06/18/must-know-security-tips-non-technical-fathers/ http://www.welivesecurity.com/2015/06/18/must-know-security-tips-non-technical-fathers/#comments Thu, 18 Jun 2015 12:49:08 +0000 http://www.welivesecurity.com/?p=64239 Few people’s idea of a relaxing Father's Day involves getting to grips with IT security, but scammers typically target the holidays to catch out consumers.

The post Must-know security tips for non-technical fathers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/18/must-know-security-tips-non-technical-fathers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/non-technical-fathers.jpg
DuckDuckGo traffic up after Apple integration and privacy issues http://www.welivesecurity.com/2015/06/18/duckduckgo-traffic-apple-integration-privacy-scares/ http://www.welivesecurity.com/2015/06/18/duckduckgo-traffic-apple-integration-privacy-scares/#comments Thu, 18 Jun 2015 12:19:06 +0000 http://www.welivesecurity.com/?p=64408 Privacy search engine DuckDuckGo has seen traffic rocket after recent widely publicized privacy scares, according to the company.

The post DuckDuckGo traffic up after Apple integration and privacy issues appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/18/duckduckgo-traffic-apple-integration-privacy-scares/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/surveillance_camera_640.jpg
UK Consumers willing to share DNA with banks to secure identity http://www.welivesecurity.com/2015/06/17/uk-consumers-willing-share-dna-banks-secure-identity/ http://www.welivesecurity.com/2015/06/17/uk-consumers-willing-share-dna-banks-secure-identity/#comments Wed, 17 Jun 2015 16:24:19 +0000 http://www.welivesecurity.com/?p=64397 Consumers in the UK would be happy to share their DNA if it would help secure their financial and personal information, according to a new report.

The post UK Consumers willing to share DNA with banks to secure identity appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/17/uk-consumers-willing-share-dna-banks-secure-identity/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/Biometric_eye_iris.jpg
Top US baseball team accused of hacking rival http://www.welivesecurity.com/2015/06/17/st-louis-cardinals-houston-astros-hack/ http://www.welivesecurity.com/2015/06/17/st-louis-cardinals-houston-astros-hack/#comments Wed, 17 Jun 2015 15:16:50 +0000 http://www.welivesecurity.com/?p=64379 The St. Louis Cardinals, one the United States's top major league baseball teams, is being investigated for allegedly hacking into the computer systems of sporting rivals.

The post Top US baseball team accused of hacking rival appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/17/st-louis-cardinals-houston-astros-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/cardinals-wide.jpeg
New exploit compromises Samsung Galaxy phones http://www.welivesecurity.com/2015/06/17/new-exploit-compromises-samsung-galaxy-phones/ http://www.welivesecurity.com/2015/06/17/new-exploit-compromises-samsung-galaxy-phones/#comments Wed, 17 Jun 2015 12:49:20 +0000 http://www.welivesecurity.com/?p=64369 Potentially 600m Samsung Galaxy phones are at risk of malicious compromise after a new exploit was discovered by a security researcher.

The post New exploit compromises Samsung Galaxy phones appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/17/new-exploit-compromises-samsung-galaxy-phones/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/Samsung_galaxy_640-623x410.jpg
EU data protection regulation overhaul inches closer http://www.welivesecurity.com/2015/06/16/eu-data-protection-regulation-overhaul-inches-closer/ http://www.welivesecurity.com/2015/06/16/eu-data-protection-regulation-overhaul-inches-closer/#comments Tue, 16 Jun 2015 16:08:37 +0000 http://www.welivesecurity.com/?p=64290 The 28 EU member states have taken a significant step towards a historic overhaul of EU-wide data protection laws, first proposed three years ago.

The post EU data protection regulation overhaul inches closer appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/16/eu-data-protection-regulation-overhaul-inches-closer/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/UE_legislacion_proteccion_datos-623x410.jpg
Password security firm LastPass compromised http://www.welivesecurity.com/2015/06/16/password-security-firm-lastpass-compromised/ http://www.welivesecurity.com/2015/06/16/password-security-firm-lastpass-compromised/#comments Tue, 16 Jun 2015 10:56:33 +0000 http://www.welivesecurity.com/?p=64275 Popular online password vault provider LastPass has warned users to update their master account passwords after their network was hacked.

The post Password security firm LastPass compromised appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/16/password-security-firm-lastpass-compromised/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/lastpass-password-security-compromised.jpg
A beginner’s guide to starting in InfoSec http://www.welivesecurity.com/2015/06/16/beginners-guide-starting-infosec/ http://www.welivesecurity.com/2015/06/16/beginners-guide-starting-infosec/#comments Tue, 16 Jun 2015 08:37:48 +0000 http://www.welivesecurity.com/?p=64249 Much ink has been spilt about the shortage of people trained in information security – especially the lack of women in the industry. Lysa Myers discusses.

The post A beginner’s guide to starting in InfoSec appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/16/beginners-guide-starting-infosec/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/shutterstock_285775409.jpg
Uber site flaw allows hacker to display rival ad http://www.welivesecurity.com/2015/06/15/uber-site-flaw-allows-hacker-display-rival-ad/ http://www.welivesecurity.com/2015/06/15/uber-site-flaw-allows-hacker-display-rival-ad/#comments Mon, 15 Jun 2015 15:00:30 +0000 http://www.welivesecurity.com/?p=64232 A flaw in taxi cab network Uber’s site allowed a security researcher to manipulate the firms home page and display a rival advert, it has been claimed.

The post Uber site flaw allows hacker to display rival ad appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/15/uber-site-flaw-allows-hacker-display-rival-ad/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/uber_hack_phone_640.jpg
Wikipedia switches to HTTPS by default http://www.welivesecurity.com/2015/06/15/wikipedia-switches-https-default/ http://www.welivesecurity.com/2015/06/15/wikipedia-switches-https-default/#comments Mon, 15 Jun 2015 11:37:04 +0000 http://www.welivesecurity.com/?p=64211 Wikimedia has announced that all of its web properties – including the enormously popular crowd-sourced dictionary Wikipedia – will now use HTTPS encryption by default.

The post Wikipedia switches to HTTPS by default appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/15/wikipedia-switches-https-default/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/Https_wikipedia.jpg
iOS bug leaves iCloud passwords vulnerable http://www.welivesecurity.com/2015/06/12/ios-bug-leaves-icloud-passwords-vulnerable/ http://www.welivesecurity.com/2015/06/12/ios-bug-leaves-icloud-passwords-vulnerable/#comments Fri, 12 Jun 2015 15:25:48 +0000 http://www.welivesecurity.com/?p=64154 A security researcher has highlighted an iOS bug that makes it easier for hackers to to steal iCloud passwords.

The post iOS bug leaves iCloud passwords vulnerable appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/12/ios-bug-leaves-icloud-passwords-vulnerable/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/ios-icloud-bug.jpg
Snapchat bolsters security with optional Two-factor authentication http://www.welivesecurity.com/2015/06/12/snapchat-bolsters-security-optional-two-factor-authentication/ http://www.welivesecurity.com/2015/06/12/snapchat-bolsters-security-optional-two-factor-authentication/#comments Fri, 12 Jun 2015 14:45:08 +0000 http://www.welivesecurity.com/?p=64169 Snapchat has added an option for two-factor authentication in its latest update, followed in the footsteps of Apple, Twitter and Facebook.

The post Snapchat bolsters security with optional Two-factor authentication appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/12/snapchat-bolsters-security-optional-two-factor-authentication/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/snapchat-2fa.jpg
FBI trace celebrity iCloud hacks to Chicago home http://www.welivesecurity.com/2015/06/11/fbi-trace-celebrity-icloud-hacks-chicago-home/ http://www.welivesecurity.com/2015/06/11/fbi-trace-celebrity-icloud-hacks-chicago-home/#comments Thu, 11 Jun 2015 15:57:26 +0000 http://www.welivesecurity.com/?p=64121 The FBI has seized a computer, cellphones and storage devices belonging to a Chicago man thought to be responsible for last year's iCloud hacks.

The post FBI trace celebrity iCloud hacks to Chicago home appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/11/fbi-trace-celebrity-icloud-hacks-chicago-home/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/icloud-celebrity-hack-fbi-623x4101.jpg
Europol shuts down cybercrime ring with 49 arrests http://www.welivesecurity.com/2015/06/11/europol-shuts-cybercrime-ring-49-arrests/ http://www.welivesecurity.com/2015/06/11/europol-shuts-cybercrime-ring-49-arrests/#comments Thu, 11 Jun 2015 11:18:36 +0000 http://www.welivesecurity.com/?p=64112 Europol's European Cybercrime Centre has arrested 49 suspects in a joint international operation targeting the takedown of a major cybercrime ring.

The post Europol shuts down cybercrime ring with 49 arrests appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/11/europol-shuts-cybercrime-ring-49-arrests/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/europol-cybercrime-ring.jpg
Credit Unions and the Data Security Act of 2015 http://www.welivesecurity.com/2015/06/11/credit-unions-data-security-act-2015/ http://www.welivesecurity.com/2015/06/11/credit-unions-data-security-act-2015/#comments Thu, 11 Jun 2015 10:19:16 +0000 http://www.welivesecurity.com/?p=64033 Credit Unions lost a lot of money due to recent breaches, so financial institutions are eager to see merchants held to higher standards for data security.

The post Credit Unions and the Data Security Act of 2015 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/11/credit-unions-data-security-act-2015/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/credit-union-security-breach-2.jpg
British businesses spend £34bn a year defending cyberattacks, limiting growth http://www.welivesecurity.com/2015/06/10/british-businesses-spend-34bn-year-cyberattacks-limiting-growth/ http://www.welivesecurity.com/2015/06/10/british-businesses-spend-34bn-year-cyberattacks-limiting-growth/#comments Wed, 10 Jun 2015 12:22:07 +0000 http://www.welivesecurity.com/?p=64039 A new survey has estimated that British businesses spend around £34bn a year ($52.5bn) protecting the country from cyberattacks,

The post British businesses spend £34bn a year defending cyberattacks, limiting growth appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/10/british-businesses-spend-34bn-year-cyberattacks-limiting-growth/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/british-business-industry-cyberattack.jpg
IT security budgets will continue to rise, finds Dell report http://www.welivesecurity.com/2015/06/09/it-security-budgets-will-continue-to-rise-finds-dell-report/ http://www.welivesecurity.com/2015/06/09/it-security-budgets-will-continue-to-rise-finds-dell-report/#comments Tue, 09 Jun 2015 15:52:32 +0000 http://www.welivesecurity.com/?p=63992 Around half of IT security leaders said that budgets will significantly increase (19%) or increase (31%) over the next two years, finds a new report.

The post IT security budgets will continue to rise, finds Dell report appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/09/it-security-budgets-will-continue-to-rise-finds-dell-report/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/it-security-budget-use.jpg
US Army website defaced by Syrian Electronic Army hackers http://www.welivesecurity.com/2015/06/09/us-army-website-hack/ http://www.welivesecurity.com/2015/06/09/us-army-website-hack/#comments Tue, 09 Jun 2015 10:38:07 +0000 http://www.welivesecurity.com/?p=63976 Hackers, supportive of the Assad regime in Syria, have successfully compromised content displayed on the US Army's website, popping up messages to visitors

The post US Army website defaced by Syrian Electronic Army hackers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/09/us-army-website-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/us-army-wide.jpeg
Congresswoman Katherine Clark targets online abuse with new bill http://www.welivesecurity.com/2015/06/08/congresswoman-katherine-clark-targets-online-abuse-new-bill/ http://www.welivesecurity.com/2015/06/08/congresswoman-katherine-clark-targets-online-abuse-new-bill/#comments Mon, 08 Jun 2015 14:42:23 +0000 http://www.welivesecurity.com/?p=63909 United States Representative Katherine Clark is hoping to provide more support for victims of online abuse with a new bill offering resources and education.

The post Congresswoman Katherine Clark targets online abuse with new bill appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/08/congresswoman-katherine-clark-targets-online-abuse-new-bill/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/white-house-online-abuse-congresswoman.jpg
OpenSesame: Hacked kids’ toy could open garage doors http://www.welivesecurity.com/2015/06/05/opensesame-hacked-kids-toy-open-garage-doors/ http://www.welivesecurity.com/2015/06/05/opensesame-hacked-kids-toy-open-garage-doors/#comments Fri, 05 Jun 2015 16:19:44 +0000 http://www.welivesecurity.com/?p=63851 Garage doors may be vulnerable to being opened remotely by hackers using little more than a children's toy, a security researcher has proven this week.

The post OpenSesame: Hacked kids’ toy could open garage doors appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/05/opensesame-hacked-kids-toy-open-garage-doors/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/hacker-toy-garage.jpg
4 million government employees’ personal data stolen in OPM hack http://www.welivesecurity.com/2015/06/05/4-million-government-employees-personal-data-stolen-opm-hack/ http://www.welivesecurity.com/2015/06/05/4-million-government-employees-personal-data-stolen-opm-hack/#comments Fri, 05 Jun 2015 13:18:17 +0000 http://www.welivesecurity.com/?p=63842 Four million federal employees have had their personal data stolen from the Office of Personnel Management, according to a statement on its website.

The post 4 million government employees’ personal data stolen in OPM hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/05/4-million-government-employees-personal-data-stolen-opm-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/rombertik-malware.jpg
What is Cyber Insurance? http://www.welivesecurity.com/2015/06/05/cyber-insurance/ http://www.welivesecurity.com/2015/06/05/cyber-insurance/#comments Fri, 05 Jun 2015 12:00:52 +0000 http://www.welivesecurity.com/?p=63789 What is cyber insurance, and is it worth considering to protect your business?

The post What is Cyber Insurance? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/05/cyber-insurance/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/what-is-cyber-insurance.jpg
Batman v Superman: Dawn of Cybercrime Justice? http://www.welivesecurity.com/2015/06/05/batman-v-superman-dawn-of-cybercrime-justice/ http://www.welivesecurity.com/2015/06/05/batman-v-superman-dawn-of-cybercrime-justice/#comments Fri, 05 Jun 2015 10:47:38 +0000 http://www.welivesecurity.com/?p=63804 The fight against cybercrime could use some superheroes, but who would do a better job: Batman or Superman?

The post Batman v Superman: Dawn of Cybercrime Justice? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/05/batman-v-superman-dawn-of-cybercrime-justice/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/cyber-super-hero.jpg
Hackers invited to break Apple, Fitbit and Samsung devices at Defcon 2015 http://www.welivesecurity.com/2015/06/04/hackers-invited-break-apple-fitbit-samsung-devices-defcon-2015/ http://www.welivesecurity.com/2015/06/04/hackers-invited-break-apple-fitbit-samsung-devices-defcon-2015/#comments Thu, 04 Jun 2015 16:24:45 +0000 http://www.welivesecurity.com/?p=63785 Internet of Things devices from the likes of Apple, Fitbit and Samsung will be pushed to their limits this August at the DefCon 23 conference, where hackers have been invited to test the latest gadgets for possible exploits.

The post Hackers invited to break Apple, Fitbit and Samsung devices at Defcon 2015 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/04/hackers-invited-break-apple-fitbit-samsung-devices-defcon-2015/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/hackers-defcon-break-devices-623x4101.jpg
Just 6% of UK workers trained for phishing attacks, reveals study http://www.welivesecurity.com/2015/06/04/just-6-workers-trained-phishing-attacks-reveals-study/ http://www.welivesecurity.com/2015/06/04/just-6-workers-trained-phishing-attacks-reveals-study/#comments Thu, 04 Jun 2015 15:22:26 +0000 http://www.welivesecurity.com/?p=63798 Just six percent of British employees have received training in dealing with phishing attacks, a survey has revealed.

The post Just 6% of UK workers trained for phishing attacks, reveals study appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/04/just-6-workers-trained-phishing-attacks-reveals-study/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/phishing1.jpg
Could brainwaves replace the password? http://www.welivesecurity.com/2015/06/03/brainwaves-replace-password/ http://www.welivesecurity.com/2015/06/03/brainwaves-replace-password/#comments Wed, 03 Jun 2015 14:30:51 +0000 http://www.welivesecurity.com/?p=63750 As biometrics become more popular, the password is increasingly losing ground to new alternatives. So, are Brainwaves the next big thing biometrics?

The post Could brainwaves replace the password? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/03/brainwaves-replace-password/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/brainprint-brain-password-1.jpg
(More) Confessions of a Support Scammer http://www.welivesecurity.com/2015/06/03/confessions-support-scammer/ http://www.welivesecurity.com/2015/06/03/confessions-support-scammer/#comments Wed, 03 Jun 2015 10:47:07 +0000 http://www.welivesecurity.com/?p=63526 David Harley examines the latest confessions of a support scammer to appear on the web, this time from a Reddit Q&A.

The post (More) Confessions of a Support Scammer appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/03/confessions-support-scammer/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/call-center-623x410.jpg
Cost of UK cybersecurity breaches double, government commissioned survey finds http://www.welivesecurity.com/2015/06/03/cost-uk-cybersecurity-breaches-double-government-commissioned-survey-finds/ http://www.welivesecurity.com/2015/06/03/cost-uk-cybersecurity-breaches-double-government-commissioned-survey-finds/#comments Wed, 03 Jun 2015 10:29:35 +0000 http://www.welivesecurity.com/?p=63739 The average 'low-end' cost of a major cybersecurity breach has more than doubled from £600,000 (~$917,000) to £1.46 million (~$2.2 million) in the last year.

The post Cost of UK cybersecurity breaches double, government commissioned survey finds appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/03/cost-uk-cybersecurity-breaches-double-government-commissioned-survey-finds/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/houses-of-parliament-london.jpg
Home Depot calls on court to dismiss consumer data breach case http://www.welivesecurity.com/2015/06/02/home-depot-calls-court-dismiss-consumer-data-breach-case/ http://www.welivesecurity.com/2015/06/02/home-depot-calls-court-dismiss-consumer-data-breach-case/#comments Tue, 02 Jun 2015 14:08:46 +0000 http://www.welivesecurity.com/?p=63706 The Home Depot has called upon a federal court to dismiss a lawsuit brought about by consumers claiming they were hurt by last year's data breach.

The post Home Depot calls on court to dismiss consumer data breach case appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/02/home-depot-calls-court-dismiss-consumer-data-breach-case/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/Home-Depot.jpg
Online threats only illegal if intentional, rules Supreme Court http://www.welivesecurity.com/2015/06/02/online-threats-illegal-intentional-rules-supreme-court/ http://www.welivesecurity.com/2015/06/02/online-threats-illegal-intentional-rules-supreme-court/#comments Tue, 02 Jun 2015 12:52:02 +0000 http://www.welivesecurity.com/?p=63686 The Supreme Court has reversed the decision to convict a Pennsylvania man who directed violent online threats at his ex-wife, citing intent as necessary legal grounds for conviction.

The post Online threats only illegal if intentional, rules Supreme Court appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/02/online-threats-illegal-intentional-rules-supreme-court/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/supreme-court-online-threats-623x4101.jpg
56 million login credentials at risk from app vulnerability http://www.welivesecurity.com/2015/06/01/56-million-login-credentials-risk-app-vulnerability/ http://www.welivesecurity.com/2015/06/01/56-million-login-credentials-risk-app-vulnerability/#comments Mon, 01 Jun 2015 15:34:58 +0000 http://www.welivesecurity.com/?p=63637 As many as 56 million login credentials may be at risk because of cloud services used incorrectly by app developers, according to new research from the University of Darmstadt.

The post 56 million login credentials at risk from app vulnerability appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/01/56-million-login-credentials-risk-app-vulnerability/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/app-vulnerability-login-data-exposed-623x4101.jpg
Is your GoPro camera secretly spying on you? http://www.welivesecurity.com/2015/06/01/gopro-camera-spy/ http://www.welivesecurity.com/2015/06/01/gopro-camera-spy/#comments Mon, 01 Jun 2015 12:32:30 +0000 http://www.welivesecurity.com/?p=63618 Poor choices of passwords can lead to your privacy being breached, after researchers revealed just how easy it could be for hackers to break into GoPro cameras.

The post Is your GoPro camera secretly spying on you? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/01/gopro-camera-spy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/06/gopro-wide.jpeg
How goes the switch to Chip & Signature cards in the US? http://www.welivesecurity.com/2015/06/01/how-goes-the-switch-to-chip-signature-cards-in-the-us/ http://www.welivesecurity.com/2015/06/01/how-goes-the-switch-to-chip-signature-cards-in-the-us/#comments Mon, 01 Jun 2015 12:00:03 +0000 http://www.welivesecurity.com/?p=63393 With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will they likely be scrambling at the last minute?

The post How goes the switch to Chip & Signature cards in the US? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/06/01/how-goes-the-switch-to-chip-signature-cards-in-the-us/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/05/chip-and-signature.jpg