We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Mon, 27 Apr 2015 13:30:59 +0000 en-US hourly 1 WattsUpDoc: US hospitals trial AC power probes to treat medical malware http://www.welivesecurity.com/2015/04/27/wattsupdoc-us-hospitals-trial-ac-power-probes-treat-medical-malware/ http://www.welivesecurity.com/2015/04/27/wattsupdoc-us-hospitals-trial-ac-power-probes-treat-medical-malware/#comments Mon, 27 Apr 2015 13:30:59 +0000 http://www.welivesecurity.com/?p=61807 Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.

The post WattsUpDoc: US hospitals trial AC power probes to treat medical malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/27/wattsupdoc-us-hospitals-trial-ac-power-probes-treat-medical-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/medical-malware-wattsupdoc-AC-power.jpg
Thirty Meter Telescope website falls over in hacktivist DDoS attack http://www.welivesecurity.com/2015/04/27/tmt-website-ddos/ http://www.welivesecurity.com/2015/04/27/tmt-website-ddos/#comments Mon, 27 Apr 2015 11:14:04 +0000 http://www.welivesecurity.com/?p=61792 Hacktivists have launched a distributed denial-of-service attack against the website of TMT (Thirty Meter Telescope), which is planned to be the Northern hemisphere's largest, most advanced optical telescope.

The post Thirty Meter Telescope website falls over in hacktivist DDoS attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/27/tmt-website-ddos/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/telescope-623x425.jpeg
Point-of-Sale vendor has used the same admin password for 25 years http://www.welivesecurity.com/2015/04/24/point-sale-vendor-used-admin-password-25-years/ http://www.welivesecurity.com/2015/04/24/point-sale-vendor-used-admin-password-25-years/#comments Fri, 24 Apr 2015 12:48:33 +0000 http://www.welivesecurity.com/?p=61726 A major vendor of point-of-sale terminals has not changed the default passwords used on its devices in a quarter of a century, researchers have revealed at RSA 2015.

The post Point-of-Sale vendor has used the same admin password for 25 years appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/24/point-sale-vendor-used-admin-password-25-years/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/pos-password-unchanged-25-years.jpg
Hack on the track: Signaling flaw leaves UK trains vulnerable http://www.welivesecurity.com/2015/04/24/hack-track-signaling-flaw-leaves-uk-trains-vulnerable/ http://www.welivesecurity.com/2015/04/24/hack-track-signaling-flaw-leaves-uk-trains-vulnerable/#comments Fri, 24 Apr 2015 11:21:19 +0000 http://www.welivesecurity.com/?p=61710 UK train services could be vulnerable to being hacked, hijacked and crashed, due to the trial of new digital signaling system designed to make lines safer.

The post Hack on the track: Signaling flaw leaves UK trains vulnerable appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/24/hack-track-signaling-flaw-leaves-uk-trains-vulnerable/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/uk-train-hack-1.jpg
RSA Conference 2015: too much technology and not enough people? http://www.welivesecurity.com/2015/04/24/rsa-conference-2015-much-technology-not-enough-people/ http://www.welivesecurity.com/2015/04/24/rsa-conference-2015-much-technology-not-enough-people/#comments Fri, 24 Apr 2015 11:07:11 +0000 http://www.welivesecurity.com/?p=61753 Major themes of the 2015 RSA Conference: the degree to which the deployment of digital devices is outpacing our ability to deploy humans with the necessary skills and knowledge needed to secure data and systems.

The post RSA Conference 2015: too much technology and not enough people? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/24/rsa-conference-2015-much-technology-not-enough-people/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/a-conference-microphone.jpg
RSA 2015, the year security goes mainstream http://www.welivesecurity.com/2015/04/24/rsa-2015-year-security-goes-mainstream/ http://www.welivesecurity.com/2015/04/24/rsa-2015-year-security-goes-mainstream/#comments Fri, 24 Apr 2015 10:16:58 +0000 http://www.welivesecurity.com/?p=61713 What were the major themes from the RSA 2015 conference? Cameron Camp is on hand to give his verdict...

The post RSA 2015, the year security goes mainstream appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/24/rsa-2015-year-security-goes-mainstream/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/RSA-conference-623x410_SP.jpg
Hacker could serve longer jail sentence than the rapists he exposed http://www.welivesecurity.com/2015/04/23/hacker-serve-longer-jail-sentence-rapists-exposed/ http://www.welivesecurity.com/2015/04/23/hacker-serve-longer-jail-sentence-rapists-exposed/#comments Thu, 23 Apr 2015 16:43:40 +0000 http://www.welivesecurity.com/?p=61675 A 26-year-old hacker who helped expose the rape of a teenage girl could spend five times longer in jail than the perpetrators he outed.

The post Hacker could serve longer jail sentence than the rapists he exposed appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/23/hacker-serve-longer-jail-sentence-rapists-exposed/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/hacktivist-jail-rape-case.jpg
Samsung Galaxy S5 could be open to fingerprint theft http://www.welivesecurity.com/2015/04/23/samsung-galaxy-s5-open-fingerprint-theft/ http://www.welivesecurity.com/2015/04/23/samsung-galaxy-s5-open-fingerprint-theft/#comments Thu, 23 Apr 2015 12:12:11 +0000 http://www.welivesecurity.com/?p=61671 The Samsung Galaxy S5 and other 'unnamed Android devices' are vulnerable to having the fingerprints they use for authentication cloned by hackers, reports Gizmodo.

The post Samsung Galaxy S5 could be open to fingerprint theft appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/23/samsung-galaxy-s5-open-fingerprint-theft/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/Samsung-Galaxy-s5-fingerprint-hack-623x4101.jpg
Ransomware: Should you pay the cybercriminals? http://www.welivesecurity.com/2015/04/23/ransomware-pay-cybercriminals/ http://www.welivesecurity.com/2015/04/23/ransomware-pay-cybercriminals/#comments Thu, 23 Apr 2015 11:13:52 +0000 http://www.welivesecurity.com/?p=61598 If your files are encrypted by ransomware, should you pay the ransom? We examine the options...

The post Ransomware: Should you pay the cybercriminals? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/23/ransomware-pay-cybercriminals/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/ransomware-should-you-pay.jpg
Hackers spy on Kansas family through unsecured baby monitor http://www.welivesecurity.com/2015/04/22/hackers-spy-kansas-family-unsecured-baby-monitor/ http://www.welivesecurity.com/2015/04/22/hackers-spy-kansas-family-unsecured-baby-monitor/#comments Wed, 22 Apr 2015 16:44:03 +0000 http://www.welivesecurity.com/?p=61607 A Kansas family are the latest victims of a hacked nanny cam, after noticing the device purchased to monitor their three-month-old baby was also monitoring them.

The post Hackers spy on Kansas family through unsecured baby monitor appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/22/hackers-spy-kansas-family-unsecured-baby-monitor/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/baby-monitor-hack-spy.jpg
Canada commits $36.4 million to cybersecurity measures in 2015 budget http://www.welivesecurity.com/2015/04/22/canada-commits-36-4-million-cybersecurity-measures-2015-budget/ http://www.welivesecurity.com/2015/04/22/canada-commits-36-4-million-cybersecurity-measures-2015-budget/#comments Wed, 22 Apr 2015 11:50:15 +0000 http://www.welivesecurity.com/?p=61593 The Conservatives' 2015-16 federal budget sees some investment in security, with $36.4 million promised over five years to address cybersecurity threats.

The post Canada commits $36.4 million to cybersecurity measures in 2015 budget appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/22/canada-commits-36-4-million-cybersecurity-measures-2015-budget/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/Canadian-parliament.jpg
The dirty secrets of webcam-hacking peeping toms and sextortionists http://www.welivesecurity.com/2015/04/21/webcam-hacking/ http://www.welivesecurity.com/2015/04/21/webcam-hacking/#comments Tue, 21 Apr 2015 17:16:26 +0000 http://www.welivesecurity.com/?p=61548 Virtually every computer sold today comes with a dirty little secret. It can spy on you. Learn more, and how to protect yourself.

The post The dirty secrets of webcam-hacking peeping toms and sextortionists appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/21/webcam-hacking/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/cassidy-wolf-623x4251.jpeg
New malware ‘Punkey’ detected in new point-of-sale attack http://www.welivesecurity.com/2015/04/21/new-malware-punkey-detected-new-point-sale-attack/ http://www.welivesecurity.com/2015/04/21/new-malware-punkey-detected-new-point-sale-attack/#comments Tue, 21 Apr 2015 15:43:06 +0000 http://www.welivesecurity.com/?p=61534 A new advanced malware program targeting point-of-sale terminals is putting customer credit card details at risk, following a number of similar attacks already this year.

The post New malware ‘Punkey’ detected in new point-of-sale attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/21/new-malware-punkey-detected-new-point-sale-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/point-of-sale-malware-punkey.jpg
1,500 iOS apps open to simple man-in-the-middle attacks http://www.welivesecurity.com/2015/04/21/1500-ios-apps-open-simple-man-middle-attacks/ http://www.welivesecurity.com/2015/04/21/1500-ios-apps-open-simple-man-middle-attacks/#comments Tue, 21 Apr 2015 11:29:08 +0000 http://www.welivesecurity.com/?p=61516 Around 1,500 apps for iPhone and iPad contain an HTTPS vulnerability making it 'trivial' for hackers to perform man-in-the-middle attacks to steal passwords, bank details and other private information.

The post 1,500 iOS apps open to simple man-in-the-middle attacks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/21/1500-ios-apps-open-simple-man-middle-attacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/ios-apps-https-vulnerabilities.jpg
Australian infosec body lobbies for mandatory security baseline http://www.welivesecurity.com/2015/04/20/australian-infosec-body-lobbies-mandatory-security-baseline/ http://www.welivesecurity.com/2015/04/20/australian-infosec-body-lobbies-mandatory-security-baseline/#comments Mon, 20 Apr 2015 16:24:45 +0000 http://www.welivesecurity.com/?p=61477 Australia's infosec industry is lobbying for a mandatory security baseline to ensure basic IT standards are met across the country, with penalties issued to those that don't comply.

The post Australian infosec body lobbies for mandatory security baseline appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/20/australian-infosec-body-lobbies-mandatory-security-baseline/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/australia-infosec.jpg
Target agrees to $19 million data breach settlement with MasterCard http://www.welivesecurity.com/2015/04/20/target-agrees-19-million-data-breach-settlement-mastercard/ http://www.welivesecurity.com/2015/04/20/target-agrees-19-million-data-breach-settlement-mastercard/#comments Mon, 20 Apr 2015 14:35:00 +0000 http://www.welivesecurity.com/?p=61482 Target has ended its dispute with MasterCard over the retail giant's 2013 data breach by agreeing to a $19 million reimbursement to issuers.

The post Target agrees to $19 million data breach settlement with MasterCard appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/20/target-agrees-19-million-data-breach-settlement-mastercard/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/Target-agrees-19m-payout-over-data-breach.jpg
Emails and documents leaked during Sony hack released by WikiLeaks http://www.welivesecurity.com/2015/04/17/emails-documents-leaked-sony-hack-released-wikileaks/ http://www.welivesecurity.com/2015/04/17/emails-documents-leaked-sony-hack-released-wikileaks/#comments Fri, 17 Apr 2015 14:42:47 +0000 http://www.welivesecurity.com/?p=61441 Hundreds and thousands of documents and emails breached during last Christmas' cyberattack on Sony Pictures have been published on WikiLeaks, reports the BBC.

The post Emails and documents leaked during Sony hack released by WikiLeaks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/17/emails-documents-leaked-sony-hack-released-wikileaks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/Julian-Assange-WikiLeaks-Sony-623x4101.jpg
Minecraft exploit makes it “easy” for hackers to crash servers http://www.welivesecurity.com/2015/04/17/minecraft-exploit-makes-easy-hackers-crash-servers/ http://www.welivesecurity.com/2015/04/17/minecraft-exploit-makes-easy-hackers-crash-servers/#comments Fri, 17 Apr 2015 12:19:00 +0000 http://www.welivesecurity.com/?p=61422 A security researcher has posted a Minecraft flaw that makes it "easy" for hackers to crash the game's servers.

The post Minecraft exploit makes it “easy” for hackers to crash servers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/17/minecraft-exploit-makes-easy-hackers-crash-servers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/minecraft_exploit.jpg
Will people always ignore security warnings? http://www.welivesecurity.com/2015/04/17/will-people-always-ignore-security-warnings/ http://www.welivesecurity.com/2015/04/17/will-people-always-ignore-security-warnings/#comments Fri, 17 Apr 2015 10:28:54 +0000 http://www.welivesecurity.com/?p=61418 How much of people's willingness to ignore security warnings is down to their brains?

The post Will people always ignore security warnings? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/17/will-people-always-ignore-security-warnings/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/why-do-people-ignore-security-warnings.jpg
Hackers could control planes over in-flight Wi-Fi, warns US government http://www.welivesecurity.com/2015/04/16/hackers-control-planes-flight-wi-fi-warns-us-government/ http://www.welivesecurity.com/2015/04/16/hackers-control-planes-flight-wi-fi-warns-us-government/#comments Thu, 16 Apr 2015 12:35:05 +0000 http://www.welivesecurity.com/?p=61357 Planes offering in-flight Wi-Fi are vulnerable to being hacked and controlled by onboard passengers, a US government watchdog has warned.

The post Hackers could control planes over in-flight Wi-Fi, warns US government appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/16/hackers-control-planes-flight-wi-fi-warns-us-government/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/plane-wifi-hacker-hijack.jpg
Data breach bill passes House committee despite concerns http://www.welivesecurity.com/2015/04/16/data-breach-bill-passes-house-committee-despite-concerns/ http://www.welivesecurity.com/2015/04/16/data-breach-bill-passes-house-committee-despite-concerns/#comments Thu, 16 Apr 2015 11:50:52 +0000 http://www.welivesecurity.com/?p=61364 The Data Security and Breach Notification Act has passed The House Energy and Commerce Committee by a vote of 29-22, reports The Hill.

The post Data breach bill passes House committee despite concerns appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/16/data-breach-bill-passes-house-committee-despite-concerns/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/02/white-house-cybercrime-agency.jpg
Healthcare security shows little sign of improvement, finds Verizon report http://www.welivesecurity.com/2015/04/15/healthcare-security-shows-little-sign-improvement-finds-verizon-report/ http://www.welivesecurity.com/2015/04/15/healthcare-security-shows-little-sign-improvement-finds-verizon-report/#comments Wed, 15 Apr 2015 15:50:02 +0000 http://www.welivesecurity.com/?p=61316 Security in the healthcare sector has been making headlines for all the wrong reasons in recent months, and a new report has found that the industry is showing little sign of cleaning up its act.

The post Healthcare security shows little sign of improvement, finds Verizon report appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/15/healthcare-security-shows-little-sign-improvement-finds-verizon-report/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/healthcare-security.jpg
How secure is your smartwatch? http://www.welivesecurity.com/2015/04/15/secure-smartwatch/ http://www.welivesecurity.com/2015/04/15/secure-smartwatch/#comments Wed, 15 Apr 2015 15:36:46 +0000 http://www.welivesecurity.com/?p=61332 Last week’s Apple Watch launch has put the spotlight back on the ‘smart’ inter-connected watches that are expected to change how we interact with each other and the internet. But how secure are they?

The post How secure is your smartwatch? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/15/secure-smartwatch/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/apple-watch-security.jpg
Lawyer claims police placed malware on requested external hard drive http://www.welivesecurity.com/2015/04/15/lawyer-claims-police-placed-malware-on-requested-external-hard-drive/ http://www.welivesecurity.com/2015/04/15/lawyer-claims-police-placed-malware-on-requested-external-hard-drive/#comments Wed, 15 Apr 2015 13:43:12 +0000 http://www.welivesecurity.com/?p=61308 A lawyer in Arkansas is claiming that police planted three different pieces of malware on an external hard drive in a controversial whistleblower case against the police force, reports 5 News Online.

The post Lawyer claims police placed malware on requested external hard drive appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/15/lawyer-claims-police-placed-malware-on-requested-external-hard-drive/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/lawyer-claims-police-plant-malware-on-whistle-blowers-hard-drive.jpg
Four Mortal Kombat moves cybercriminals use to attack your security http://www.welivesecurity.com/2015/04/14/four-mortal-kombat-moves-cybercriminals-use-to-attack-your-security/ http://www.welivesecurity.com/2015/04/14/four-mortal-kombat-moves-cybercriminals-use-to-attack-your-security/#comments Tue, 14 Apr 2015 15:31:39 +0000 http://www.welivesecurity.com/?p=61267 Some of the tricks employed by the characters in the Mortal Kombat series aren't a million miles away from those deployed by cybercriminals...

The post Four Mortal Kombat moves cybercriminals use to attack your security appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/14/four-mortal-kombat-moves-cybercriminals-use-to-attack-your-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/mortal_kombat_fatility_eset-e1429021752415.png
Dutch government to launch Global Forum on Cyber Expertise http://www.welivesecurity.com/2015/04/14/dutch-government-launch-global-forum-cyber-expertise/ http://www.welivesecurity.com/2015/04/14/dutch-government-launch-global-forum-cyber-expertise/#comments Tue, 14 Apr 2015 13:49:43 +0000 http://www.welivesecurity.com/?p=61241 The Dutch government is to launch the Global Forum on Cyber Expertise, with the intention of capacity building in the fields of cybersecurity, cybercrime, data regulation and e-development.

The post Dutch government to launch Global Forum on Cyber Expertise appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/14/dutch-government-launch-global-forum-cyber-expertise/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/global-forum-cybersecurity-expertise.jpg
Tech Support Scammers with Teeth http://www.welivesecurity.com/2015/04/14/tech-support-scammers-teeth/ http://www.welivesecurity.com/2015/04/14/tech-support-scammers-teeth/#comments Tue, 14 Apr 2015 12:52:08 +0000 http://www.welivesecurity.com/?p=60841 Some support scammers and their assassination threats may seem dumb, but they're no joke.They can cause serious damage as we discuss it in this article.

The post Tech Support Scammers with Teeth appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/14/tech-support-scammers-teeth/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/dragon.jpg
Australian government issues warning over ‘ISIS hacks’ http://www.welivesecurity.com/2015/04/13/australian-government-issues-warning-isis-hacks/ http://www.welivesecurity.com/2015/04/13/australian-government-issues-warning-isis-hacks/#comments Mon, 13 Apr 2015 13:17:13 +0000 http://www.welivesecurity.com/?p=61137 Australia's federal government has issued a warning over the spate of recent website hacks claiming to have links with extremist group ISIS.

The post Australian government issues warning over ‘ISIS hacks’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/13/australian-government-issues-warning-isis-hacks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/australia-isis-hacking-alert.jpg
USB Type-C: Could new laptop ports be a malware entry point? http://www.welivesecurity.com/2015/04/13/usb-type-c-new-laptop-ports-malware-entry-point/ http://www.welivesecurity.com/2015/04/13/usb-type-c-new-laptop-ports-malware-entry-point/#comments Mon, 13 Apr 2015 13:14:56 +0000 http://www.welivesecurity.com/?p=61133 USB Type-C will both charge your laptop battery and offer fast data transfer speeds, but what does this mean for security?

The post USB Type-C: Could new laptop ports be a malware entry point? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/13/usb-type-c-new-laptop-ports-malware-entry-point/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/usb-c-possible-hacking-risk-623x4101.jpg
Vulnerability in common hotel routers threatens guest devices http://www.welivesecurity.com/2015/04/10/vulnerability-common-hotel-routers-threatens-guest-devices/ http://www.welivesecurity.com/2015/04/10/vulnerability-common-hotel-routers-threatens-guest-devices/#comments Fri, 10 Apr 2015 14:31:24 +0000 http://www.welivesecurity.com/?p=61071 A vulnerability in the Wi-Fi routers used in hundreds of hotels across the world has been uncovered by security researchers, Wired reports.

The post Vulnerability in common hotel routers threatens guest devices appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/10/vulnerability-common-hotel-routers-threatens-guest-devices/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/hotel-wifi-router-vulerability-found.jpg
National Power Grid suffers frequent cyberattacks, says report http://www.welivesecurity.com/2015/04/10/national-power-grid-suffers-frequent-cyberattacks-says-report/ http://www.welivesecurity.com/2015/04/10/national-power-grid-suffers-frequent-cyberattacks-says-report/#comments Fri, 10 Apr 2015 11:54:47 +0000 http://www.welivesecurity.com/?p=61062 The US national power grid is subject to physical or online attacks around once every four days, a report by USA Today reveals.

The post National Power Grid suffers frequent cyberattacks, says report appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/10/national-power-grid-suffers-frequent-cyberattacks-says-report/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/global-powergrid-at-cybersecurity-risk.jpg
Your identity has already been stolen, ‘Catch Me If You Can’ subject warns US citizens http://www.welivesecurity.com/2015/04/09/identity-already-stolen-catch-can-subject-warns-us-citizens/ http://www.welivesecurity.com/2015/04/09/identity-already-stolen-catch-can-subject-warns-us-citizens/#comments Thu, 09 Apr 2015 16:15:56 +0000 http://www.welivesecurity.com/?p=61043 The reformed conman that the 2002 film 'Catch Me If You Can' is based on has told The Times that anyone living in the US or UK has already had their identity stolen.

The post Your identity has already been stolen, ‘Catch Me If You Can’ subject warns US citizens appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/09/identity-already-stolen-catch-can-subject-warns-us-citizens/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/Frank-Abagnale.jpg
Google pulls Chrome screenshot extension, after it leaks personal data http://www.welivesecurity.com/2015/04/09/google-pulls-chrome-extension-data-leak/ http://www.welivesecurity.com/2015/04/09/google-pulls-chrome-extension-data-leak/#comments Thu, 09 Apr 2015 15:31:32 +0000 http://www.welivesecurity.com/?p=61015 A Chrome extension designed for taking and annotating screenshots has been found to be leaking sensitive data from its 1.2 million users.

The post Google pulls Chrome screenshot extension, after it leaks personal data appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/09/google-pulls-chrome-extension-data-leak/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/google-chrome-extension-data.jpg
Operation Buhtrap, the trap for Russian accountants http://www.welivesecurity.com/2015/04/09/operation-buhtrap/ http://www.welivesecurity.com/2015/04/09/operation-buhtrap/#comments Thu, 09 Apr 2015 12:44:45 +0000 http://www.welivesecurity.com/?p=60858 The Operation Buhtrap campaign targets a wide range of Russian banks, used several different code signing certificates and implements evasive methods to avoid detection.

The post Operation Buhtrap, the trap for Russian accountants appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/09/operation-buhtrap/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/operation-buhtrap.jpg
Hackers hide malware in fake game pages hosted on Steam http://www.welivesecurity.com/2015/04/08/hackers-hide-malware-fake-game-pages-hosted-steam/ http://www.welivesecurity.com/2015/04/08/hackers-hide-malware-fake-game-pages-hosted-steam/#comments Wed, 08 Apr 2015 15:36:15 +0000 http://www.welivesecurity.com/?p=60933 Gamers downloading from Steam should beware of fake game pages, after a spate of clone titles were found on the service hiding harmful malware.

The post Hackers hide malware in fake game pages hosted on Steam appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/08/hackers-hide-malware-fake-game-pages-hosted-steam/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/steam-fake-games-malware.jpg
One hacker per month convicted under UK Computer Misuse Act http://www.welivesecurity.com/2015/04/08/one-hacker-per-month-convicted-uk-computer-misuse-act/ http://www.welivesecurity.com/2015/04/08/one-hacker-per-month-convicted-uk-computer-misuse-act/#comments Wed, 08 Apr 2015 14:26:53 +0000 http://www.welivesecurity.com/?p=60932 The Computer Misuse Act has resulted in an average of just one criminal conviction per month for the past 23 years, according to UK Home Office ministers.

The post One hacker per month convicted under UK Computer Misuse Act appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/08/one-hacker-per-month-convicted-uk-computer-misuse-act/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/one-hacker-a-month-convicted-uk.jpg
Waski downloader spreads banker Trojan targeting users worldwide http://www.welivesecurity.com/2015/04/08/waski-downloader-spreads-banker-trojan-targeting-users-worldwide/ http://www.welivesecurity.com/2015/04/08/waski-downloader-spreads-banker-trojan-targeting-users-worldwide/#comments Wed, 08 Apr 2015 13:00:24 +0000 http://www.welivesecurity.com/?p=60826 If you have recently received an unexpected email with a ZIP file attached, it could be a threat attempting to steal your banking login credentials. Its name is Waski and is detected by ESET as Win32/TrojanDownloader.Waski.

The post Waski downloader spreads banker Trojan targeting users worldwide appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/08/waski-downloader-spreads-banker-trojan-targeting-users-worldwide/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/banking_trojan.jpg
Kendall Jenner has her Twitter hacked, and rude things are said about Justin Bieber http://www.welivesecurity.com/2015/04/08/kendall-jenner-twitter-hacked/ http://www.welivesecurity.com/2015/04/08/kendall-jenner-twitter-hacked/#comments Wed, 08 Apr 2015 12:19:16 +0000 http://www.welivesecurity.com/?p=60900 Twitter hackers hit the account of TV reality star Kendall Jenner, posting tweets about her father and Justin Bieber. Kendall Jenner is the latest member of the Kardashian Klan to have suffered at the hands of hackers.

The post Kendall Jenner has her Twitter hacked, and rude things are said about Justin Bieber appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/08/kendall-jenner-twitter-hacked/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/kendall-jenner-623x425.jpeg
Hacked nanny cam plays mysterious music to sleeping baby http://www.welivesecurity.com/2015/04/07/hacked-nanny-cam-plays-mysterious-music-sleeping-baby/ http://www.welivesecurity.com/2015/04/07/hacked-nanny-cam-plays-mysterious-music-sleeping-baby/#comments Tue, 07 Apr 2015 12:46:18 +0000 http://www.welivesecurity.com/?p=60806 A Minnesota family was the victim of a hacked nanny cam last week, as they learnt that the monitor they used to check on their baby was being watched and controlled by strangers overseas.

The post Hacked nanny cam plays mysterious music to sleeping baby appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/07/hacked-nanny-cam-plays-mysterious-music-sleeping-baby/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/hacked-camera-baby-music-nanny-1.jpg
Linux Australia conference database hit by hackers http://www.welivesecurity.com/2015/04/07/linux-australia-conference-database-hit-hackers/ http://www.welivesecurity.com/2015/04/07/linux-australia-conference-database-hit-hackers/#comments Tue, 07 Apr 2015 11:57:21 +0000 http://www.welivesecurity.com/?p=60803 Organizers of the Linux Australia conference have revealed that personal data of delegates may have been exposed after a hacker was able to gain access to a server, reports Security Affairs.

The post Linux Australia conference database hit by hackers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/07/linux-australia-conference-database-hit-hackers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/01/Australian-flag.jpg
The hacker games that made beating security feel like a thrill http://www.welivesecurity.com/2015/04/06/hacker-games-made-beating-security-feel-like-thrill/ http://www.welivesecurity.com/2015/04/06/hacker-games-made-beating-security-feel-like-thrill/#comments Mon, 06 Apr 2015 13:00:10 +0000 http://www.welivesecurity.com/?p=60104 Real-world hacking has long since spawned legions of more glamorous portrayals in videogames. Here are five of the best that take hacking and elevate it to thrilling levels.

The post The hacker games that made beating security feel like a thrill appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/06/hacker-games-made-beating-security-feel-like-thrill/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/hacking-in-videogames.jpg
Twitter and YouTube blocked in Turkey over hostage photos http://www.welivesecurity.com/2015/04/06/twitter-youtube-blocked-hostage/ http://www.welivesecurity.com/2015/04/06/twitter-youtube-blocked-hostage/#comments Mon, 06 Apr 2015 13:00:06 +0000 http://www.welivesecurity.com/?p=60751 Access to popular social media sites such as Twitter and YouTube has been shut down in Turkey, following a court ruling today.

The post Twitter and YouTube blocked in Turkey over hostage photos appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/06/twitter-youtube-blocked-hostage/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/twitter-623x425.jpeg
Hackers set up Pirate Bay clone to distribute banking trojan http://www.welivesecurity.com/2015/04/03/hackers-set-pirate-bay-clone-distribute-banking-trojan/ http://www.welivesecurity.com/2015/04/03/hackers-set-pirate-bay-clone-distribute-banking-trojan/#comments Fri, 03 Apr 2015 11:00:57 +0000 http://www.welivesecurity.com/?p=60736 Wordpress sites are being targeted by a Pirate Bay clone set up by hackers to distribute malware and a banking trojan, reports The Next Web.

The post Hackers set up Pirate Bay clone to distribute banking trojan appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/03/hackers-set-pirate-bay-clone-distribute-banking-trojan/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/Pirate-Bay-Clone-Banking-Trojan.jpg
US teen pleads guilty to $100 million gaming hack http://www.welivesecurity.com/2015/04/03/us-teen-pleads-guilty-100-million-gaming-hack/ http://www.welivesecurity.com/2015/04/03/us-teen-pleads-guilty-100-million-gaming-hack/#comments Fri, 03 Apr 2015 10:16:40 +0000 http://www.welivesecurity.com/?p=60720 An Indiana teen has pleaded guilty to his involvement in a hacking ring that is said to have stolen data worth more than $100 million from major gaming developers.

The post US teen pleads guilty to $100 million gaming hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/03/us-teen-pleads-guilty-100-million-gaming-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/gaming-hack-teen-pleads-guilty.jpg
Obama issues cybersecurity executive order to tackle ‘national emergency’ http://www.welivesecurity.com/2015/04/03/obama-issues-cybersecurity-executive-order-tackle-national-emergency/ http://www.welivesecurity.com/2015/04/03/obama-issues-cybersecurity-executive-order-tackle-national-emergency/#comments Fri, 03 Apr 2015 07:03:19 +0000 http://www.welivesecurity.com/?p=60719 President Barack Obama has issued an executive order allowing economic sanctions against hackers outside the United States.

The post Obama issues cybersecurity executive order to tackle ‘national emergency’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/03/obama-issues-cybersecurity-executive-order-tackle-national-emergency/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/Obama_Sanktionen_Cyberkriminelle.jpg
5 steps to take after a company is infected http://www.welivesecurity.com/2015/04/02/5-steps-take-company-infected/ http://www.welivesecurity.com/2015/04/02/5-steps-take-company-infected/#comments Thu, 02 Apr 2015 13:00:04 +0000 http://www.welivesecurity.com/?p=60116 Information security has become an even more critical factor of the business model, as it protects the most essential asset: information.

The post 5 steps to take after a company is infected appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/02/5-steps-take-company-infected/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/5-pasos.jpg
Google clean-up targets malicious ad injectors http://www.welivesecurity.com/2015/04/02/google-clean-targets-malicious-ad-injectors/ http://www.welivesecurity.com/2015/04/02/google-clean-targets-malicious-ad-injectors/#comments Thu, 02 Apr 2015 10:51:04 +0000 http://www.welivesecurity.com/?p=60695 Google has received more than 100,000 complaints this year regarding unwanted ad injectors that have infected browsers.

The post Google clean-up targets malicious ad injectors appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/02/google-clean-targets-malicious-ad-injectors/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/google-injector-ads.jpg
Easter Social Media Safety: video guides http://www.welivesecurity.com/2015/04/02/social-media-safety-video-guides/ http://www.welivesecurity.com/2015/04/02/social-media-safety-video-guides/#comments Thu, 02 Apr 2015 09:11:00 +0000 http://www.welivesecurity.com/?p=60527 Despite the holiday season though, you can't guarantee that hackers and cybercriminals won't be on the hunt for weak and vulnerable social media slip ups, so what better time to give a refresher on social media safety than now?

The post Easter Social Media Safety: video guides appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/02/social-media-safety-video-guides/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/03/social-media-safety.jpg
SEO Scams and Semi-Scams http://www.welivesecurity.com/2015/04/01/seo-scams-semi-scams/ http://www.welivesecurity.com/2015/04/01/seo-scams-semi-scams/#comments Wed, 01 Apr 2015 13:40:32 +0000 http://www.welivesecurity.com/?p=60395 Search Engine Optimization: it's an essential component of internet marketing strategy, I guess, but one with a bad public image, especially in the wake of years of abuse of optimization techniques by purveyors of malware and other bad actors (Black Hat SEO, or BHSEO).

The post SEO Scams and Semi-Scams appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/01/seo-scams-semi-scams/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/SEO_Betrug.png
Energy companies hit with new data-stealing malware http://www.welivesecurity.com/2015/04/01/energy-companies-hit-new-data-stealing-malware/ http://www.welivesecurity.com/2015/04/01/energy-companies-hit-new-data-stealing-malware/#comments Wed, 01 Apr 2015 12:54:55 +0000 http://www.welivesecurity.com/?p=60622 Energy companies have been targeted with a new multi-stage malware attack used to infect company computers and steal sensitive data.

The post Energy companies hit with new data-stealing malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/04/01/energy-companies-hit-new-data-stealing-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/04/energy-companies-malware.jpg