We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Tue, 04 Aug 2015 13:47:46 +0000 en-US hourly 1 Hackers exploit OS X zero-day vulnerability http://www.welivesecurity.com/2015/08/04/hackers-exploit-os-x-zero-day-vulnerability/ http://www.welivesecurity.com/2015/08/04/hackers-exploit-os-x-zero-day-vulnerability/#comments Tue, 04 Aug 2015 13:47:46 +0000 http://www.welivesecurity.com/?p=66753 Hackers have exploited a zero-day vulnerability in the latest version of Apple’s OS X.

The post Hackers exploit OS X zero-day vulnerability appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/04/hackers-exploit-os-x-zero-day-vulnerability/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/zero-day-vulnerability.jpg
Indiana’s AG launches investigation into major data breach http://www.welivesecurity.com/2015/08/03/indianas-ag-launches-investigation-major-data-breach/ http://www.welivesecurity.com/2015/08/03/indianas-ag-launches-investigation-major-data-breach/#comments Mon, 03 Aug 2015 12:56:47 +0000 http://www.welivesecurity.com/?p=66720 Indiana's Attorney General has launched an investigation into a data breach at Medical Informatics Engineering, which has affected up to 4 million people.

The post Indiana’s AG launches investigation into major data breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/03/indianas-ag-launches-investigation-major-data-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/Typing-keyboard.jpg
Black Hat 2015: What to watch out for, besides cars and guns http://www.welivesecurity.com/2015/08/03/black-hat-2015/ http://www.welivesecurity.com/2015/08/03/black-hat-2015/#comments Mon, 03 Aug 2015 11:01:53 +0000 http://www.welivesecurity.com/?p=66551 It's not all about crashing cars and hacking guns: what's hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.

The post Black Hat 2015: What to watch out for, besides cars and guns appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/03/black-hat-2015/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/black-hat-2015.jpg
The world’s biggest bug bounty payouts http://www.welivesecurity.com/2015/08/03/worlds-biggest-bug-bounty-payouts/ http://www.welivesecurity.com/2015/08/03/worlds-biggest-bug-bounty-payouts/#comments Mon, 03 Aug 2015 10:57:49 +0000 http://www.welivesecurity.com/?p=65925 From finding flaws to suggesting innovative security measures for the future, we look at some of the biggest bug bounty payouts in recent years.

The post The world’s biggest bug bounty payouts appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/03/worlds-biggest-bug-bounty-payouts/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/dollar-623x410.jpg
Hacking Team and other breaches as security lessons learned http://www.welivesecurity.com/2015/08/01/security-lessons-hacking-breaches/ http://www.welivesecurity.com/2015/08/01/security-lessons-hacking-breaches/#comments Sat, 01 Aug 2015 11:01:01 +0000 http://www.welivesecurity.com/?p=66417 Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.

The post Hacking Team and other breaches as security lessons learned appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/08/01/security-lessons-hacking-breaches/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/situational-awareness-80.jpg
Facebook Security Checkup feature now available http://www.welivesecurity.com/2015/07/31/facebook-security-checkup-feature-now-available/ http://www.welivesecurity.com/2015/07/31/facebook-security-checkup-feature-now-available/#comments Fri, 31 Jul 2015 14:43:59 +0000 http://www.welivesecurity.com/?p=66656 Facebook has made a new feature called Security Checkup generally available after testing on an invite-only group, according to SoftPedia.

The post Facebook Security Checkup feature now available appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/31/facebook-security-checkup-feature-now-available/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/FB_security_checkup_640-623x410.jpg
5 Systems Admin relationship tips (so you’re on talking terms again) http://www.welivesecurity.com/2015/07/31/5-systems-admin-relationship-tips/ http://www.welivesecurity.com/2015/07/31/5-systems-admin-relationship-tips/#comments Fri, 31 Jul 2015 08:00:17 +0000 http://www.welivesecurity.com/?p=66407 Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences.

The post 5 Systems Admin relationship tips (so you’re on talking terms again) appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/31/5-systems-admin-relationship-tips/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/sysadmin.jpg
United Airlines customer flight records breached http://www.welivesecurity.com/2015/07/30/united-airlines-customer-flight-records-breached/ http://www.welivesecurity.com/2015/07/30/united-airlines-customer-flight-records-breached/#comments Thu, 30 Jul 2015 16:52:52 +0000 http://www.welivesecurity.com/?p=66619 United Airlines customer flight records have been lost in a data breach it has been reported.

The post United Airlines customer flight records breached appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/30/united-airlines-customer-flight-records-breached/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/united_airlines_brecha_seguridad.jpg
Operation Potao Express: Analysis of a cyber-espionage toolkit http://www.welivesecurity.com/2015/07/30/operation-potao-express/ http://www.welivesecurity.com/2015/07/30/operation-potao-express/#comments Thu, 30 Jul 2015 10:49:20 +0000 http://www.welivesecurity.com/?p=66503 Operation Patao Express – Attackers spying on high-value targets in Ukraine, Russia and Belarus, and their TrueCrypt-encrypted data.

The post Operation Potao Express: Analysis of a cyber-espionage toolkit appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/30/operation-potao-express/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/potao-express-eset-623x4322.jpg
Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals http://www.welivesecurity.com/2015/07/29/cybersecurity-manufacturing-chrysler-jeep-hack/ http://www.welivesecurity.com/2015/07/29/cybersecurity-manufacturing-chrysler-jeep-hack/#comments Wed, 29 Jul 2015 13:45:04 +0000 http://www.welivesecurity.com/?p=66321 As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.

The post Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/29/cybersecurity-manufacturing-chrysler-jeep-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/jeep-pwned-sc2015.jpg
Cybersecurity is increasingly a ‘board-level’ issue, finds report http://www.welivesecurity.com/2015/07/29/cybersecurity-increasingly-board-level-issue-finds-report/ http://www.welivesecurity.com/2015/07/29/cybersecurity-increasingly-board-level-issue-finds-report/#comments Wed, 29 Jul 2015 13:33:58 +0000 http://www.welivesecurity.com/?p=66471 The majority of managers believe that IT risk management data genuinely influences board decisions, according to Gartner.

The post Cybersecurity is increasingly a ‘board-level’ issue, finds report appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/29/cybersecurity-increasingly-board-level-issue-finds-report/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/boardroom_640.jpg
‘Keystroke Biometrics’ exploit defeats Tor privacy http://www.welivesecurity.com/2015/07/29/keystroke-biometrics-exploit-defeats-tor-privacy/ http://www.welivesecurity.com/2015/07/29/keystroke-biometrics-exploit-defeats-tor-privacy/#comments Wed, 29 Jul 2015 13:26:19 +0000 http://www.welivesecurity.com/?p=66465 Security researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy measures such as Tor.

The post ‘Keystroke Biometrics’ exploit defeats Tor privacy appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/29/keystroke-biometrics-exploit-defeats-tor-privacy/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/fingers_keyboard_640.jpg
Moonpig warns of password breach – but it may be more than their users who are at risk http://www.welivesecurity.com/2015/07/29/moonpig-password/ http://www.welivesecurity.com/2015/07/29/moonpig-password/#comments Wed, 29 Jul 2015 12:01:29 +0000 http://www.welivesecurity.com/?p=66473 Moonpig, the online personalised card company, has blocked the accounts of an unspecified number of customers after users' details were published online.

The post Moonpig warns of password breach – but it may be more than their users who are at risk appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/29/moonpig-password/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/moonpig-623x425.jpeg
How to shop online safely during the summer sales http://www.welivesecurity.com/2015/07/29/how-to-shop-online-safely-during-the-summer-sales/ http://www.welivesecurity.com/2015/07/29/how-to-shop-online-safely-during-the-summer-sales/#comments Wed, 29 Jul 2015 11:32:47 +0000 http://www.welivesecurity.com/?p=65650 The summer sales are upon us and there are plenty of good deals to be had online, but internet shopping is not without its dangers.

The post How to shop online safely during the summer sales appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/29/how-to-shop-online-safely-during-the-summer-sales/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/compras_online_seguras.jpg
New report explains gulf between security experts and non-experts http://www.welivesecurity.com/2015/07/28/new-report-explains-gulf-security-experts-non-experts/ http://www.welivesecurity.com/2015/07/28/new-report-explains-gulf-security-experts-non-experts/#comments Tue, 28 Jul 2015 15:20:34 +0000 http://www.welivesecurity.com/?p=66363 Security experts and non security experts take very different attitudes to staying safe online, according to new research.

The post New report explains gulf between security experts and non-experts appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/28/new-report-explains-gulf-security-experts-non-experts/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/security-experts-gulf-623x4101.jpg
The ABC of Information Security http://www.welivesecurity.com/2015/07/28/abc-information-security/ http://www.welivesecurity.com/2015/07/28/abc-information-security/#comments Tue, 28 Jul 2015 11:00:08 +0000 http://www.welivesecurity.com/?p=66310 There are three fundamental elements that must not be overlooked when starting out in corporate security, summarized as the 'ABC of information security'.

The post The ABC of Information Security appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/28/abc-information-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/abc-information-security.jpg
Valve Steam bug sees accounts hacked http://www.welivesecurity.com/2015/07/27/valve-steam-bug-sees-accounts-hacked/ http://www.welivesecurity.com/2015/07/27/valve-steam-bug-sees-accounts-hacked/#comments Mon, 27 Jul 2015 14:02:37 +0000 http://www.welivesecurity.com/?p=66269 A serious bug in Valve’s Steam engine has allowed a series of user credentials to be stolen over the past week, according to reports.

The post Valve Steam bug sees accounts hacked appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/27/valve-steam-bug-sees-accounts-hacked/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/steam_hack_640-623x4101.jpg
Accidental pocket dials can be used in evidence, says US court http://www.welivesecurity.com/2015/07/27/accidental-pocket-dials-can-used-evidence-says-us-court/ http://www.welivesecurity.com/2015/07/27/accidental-pocket-dials-can-used-evidence-says-us-court/#comments Mon, 27 Jul 2015 13:37:57 +0000 http://www.welivesecurity.com/?p=66245 Accidental ‘pocket dials’ are now admissible in evidence against you, the US Appeals court has ruled.

The post Accidental pocket dials can be used in evidence, says US court appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/27/accidental-pocket-dials-can-used-evidence-says-us-court/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/llamado-accidental-640-623x410.jpg
Cybercrime update: take downs, arrests, convictions, and sentences http://www.welivesecurity.com/2015/07/27/cybercrime-take-downs-arrests-convictions-sentences/ http://www.welivesecurity.com/2015/07/27/cybercrime-take-downs-arrests-convictions-sentences/#comments Mon, 27 Jul 2015 10:51:15 +0000 http://www.welivesecurity.com/?p=66193 Information security could use some good news right now, something to offset the string of bad news about data breaches and system vulnerabilities; so how about this: "Cyber Criminal Forum Taken Down, Members Arrested in 20 Countries".

The post Cybercrime update: take downs, arrests, convictions, and sentences appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/27/cybercrime-take-downs-arrests-convictions-sentences/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/criminal-cuffed-623x4091.png
Researchers unveil super-fast anonymity network http://www.welivesecurity.com/2015/07/24/researchers-unveil-super-fast-anonymity-network/ http://www.welivesecurity.com/2015/07/24/researchers-unveil-super-fast-anonymity-network/#comments Fri, 24 Jul 2015 15:19:01 +0000 http://www.welivesecurity.com/?p=66179 A group of six academics have published a paper describing a new high speed anonymity network that could increase the privacy of internet users everywhere.

The post Researchers unveil super-fast anonymity network appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/24/researchers-unveil-super-fast-anonymity-network/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/hornet_640-623x41011.jpg
Open SSH bug opens brute force attack window http://www.welivesecurity.com/2015/07/23/open-ssh-bug-opens-brute-force-attack-window/ http://www.welivesecurity.com/2015/07/23/open-ssh-bug-opens-brute-force-attack-window/#comments Thu, 23 Jul 2015 16:27:19 +0000 http://www.welivesecurity.com/?p=66139 A newly disclosed bug in widely-used OpenSSH software allows attackers to make thousands of password guesses in a short space of time.

The post Open SSH bug opens brute force attack window appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/23/open-ssh-bug-opens-brute-force-attack-window/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/password_sshhack_640-623x4101.jpg
Porn clicker keeps infecting apps on Google Play http://www.welivesecurity.com/2015/07/23/porn-clicker-keeps-infecting-apps-on-google-play/ http://www.welivesecurity.com/2015/07/23/porn-clicker-keeps-infecting-apps-on-google-play/#comments Thu, 23 Jul 2015 13:00:31 +0000 http://www.welivesecurity.com/?p=65998 A recently identified trojan porn clicker is still infecting apps on Google Play.

The post Porn clicker keeps infecting apps on Google Play appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/23/porn-clicker-keeps-infecting-apps-on-google-play/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/shutterstock_181909460-623x41011.jpg
Support Scammers and Self-Justification http://www.welivesecurity.com/2015/07/23/support-scammers-self-justification/ http://www.welivesecurity.com/2015/07/23/support-scammers-self-justification/#comments Thu, 23 Jul 2015 10:21:29 +0000 http://www.welivesecurity.com/?p=65587 Support scammers: old twisters, new twists, and scammer psychology.

The post Support Scammers and Self-Justification appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/23/support-scammers-self-justification/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/estafas_telefonicas.png
Tech giants take action on ad click fraud http://www.welivesecurity.com/2015/07/22/tech-giants-take-action-on-ad-click-fraud/ http://www.welivesecurity.com/2015/07/22/tech-giants-take-action-on-ad-click-fraud/#comments Wed, 22 Jul 2015 15:59:08 +0000 http://www.welivesecurity.com/?p=66013 Some of the biggest digital companies have banded together to take action on the rising tide of ad click fraud.

The post Tech giants take action on ad click fraud appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/22/tech-giants-take-action-on-ad-click-fraud/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/ad_fraud_640-623x4101.jpg
Hackers demo Jeep security hack http://www.welivesecurity.com/2015/07/22/hackers-demo-jeep-security-hack/ http://www.welivesecurity.com/2015/07/22/hackers-demo-jeep-security-hack/#comments Wed, 22 Jul 2015 15:56:08 +0000 http://www.welivesecurity.com/?p=66009 Hackers have demonstrated an exploit that can take remote control of a Jeep, to the extent of cutting the transmission and controlling the throttle.

The post Hackers demo Jeep security hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/22/hackers-demo-jeep-security-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/hackers-demo-jeep-security-hack-623x4101.jpg
11 security mistakes you probably keep on making http://www.welivesecurity.com/2015/07/22/11-security-mistakes/ http://www.welivesecurity.com/2015/07/22/11-security-mistakes/#comments Wed, 22 Jul 2015 09:40:02 +0000 http://www.welivesecurity.com/?p=65350 When it comes to data security, hackers continue to exploit the biggest weakness – people. So, what are the top security mistakes we keep making?

The post 11 security mistakes you probably keep on making appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/22/11-security-mistakes/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/security-mistakes-we-keep-making.jpg
Smartwatch security ‘lacking’ says HP study http://www.welivesecurity.com/2015/07/21/smartwatch-security-lacking-says-hp-study/ http://www.welivesecurity.com/2015/07/21/smartwatch-security-lacking-says-hp-study/#comments Tue, 21 Jul 2015 17:08:39 +0000 http://www.welivesecurity.com/?p=65951 Smartwatch security is noticeably absent in most devices, leaving users at risk of cyberattacks.

The post Smartwatch security ‘lacking’ says HP study appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/21/smartwatch-security-lacking-says-hp-study/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/smartwatch1.jpg
Microsoft advises ‘spoofed’ Skype users to change passwords http://www.welivesecurity.com/2015/07/20/microsoft-advises-spoofed-skype-users-change-passwords/ http://www.welivesecurity.com/2015/07/20/microsoft-advises-spoofed-skype-users-change-passwords/#comments Mon, 20 Jul 2015 14:17:49 +0000 http://www.welivesecurity.com/?p=65919 Skype users have been advised by Microsoft to change their passwords following reports that 'spoofed' messages are being sent without user permission.

The post Microsoft advises ‘spoofed’ Skype users to change passwords appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/20/microsoft-advises-spoofed-skype-users-change-passwords/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/shutterstock_240363316.jpg
37 million relationship cheats could be exposed by Ashley Madison hack http://www.welivesecurity.com/2015/07/20/37-million-relationship-cheats-exposed-ashley-madison-hack/ http://www.welivesecurity.com/2015/07/20/37-million-relationship-cheats-exposed-ashley-madison-hack/#comments Mon, 20 Jul 2015 12:48:48 +0000 http://www.welivesecurity.com/?p=65904 The 37 million users of hacked infidelity site Ashley Madison are at risk of having their names and private details leaked, reports The Verge.

The post 37 million relationship cheats could be exposed by Ashley Madison hack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/20/37-million-relationship-cheats-exposed-ashley-madison-hack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/ashley-maddison-relationship-cheats.jpg
Huge Morrisons data breach due to employee with grudge, court hears http://www.welivesecurity.com/2015/07/17/huge-morrisons-data-breach-due-employee-grudge-court-hears/ http://www.welivesecurity.com/2015/07/17/huge-morrisons-data-breach-due-employee-grudge-court-hears/#comments Fri, 17 Jul 2015 16:45:55 +0000 http://www.welivesecurity.com/?p=65839 A Morrisons employee with a grudge was responsible for posting personal data of nearly 100,000 staff onto the internet, a court heard.

The post Huge Morrisons data breach due to employee with grudge, court hears appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/17/huge-morrisons-data-breach-due-employee-grudge-court-hears/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/morrisons_data_theft_640.jpg
British teenager sentenced for massive Spamhaus attack http://www.welivesecurity.com/2015/07/16/british-teenager-sentenced-massive-spamhaus-attack/ http://www.welivesecurity.com/2015/07/16/british-teenager-sentenced-massive-spamhaus-attack/#comments Thu, 16 Jul 2015 13:54:56 +0000 http://www.welivesecurity.com/?p=65802 British teen Seth Nolan Mcdonagh, aka "narko" has been sentenced for his role in a 2013 attack which slowed the internet around the world.

The post British teenager sentenced for massive Spamhaus attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/16/british-teenager-sentenced-massive-spamhaus-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/ddos_attack_640.jpg
United Airlines pays out 2 million flight miles for security bugs http://www.welivesecurity.com/2015/07/16/united-airlines-pays-2-million-flight-miles-security-bugs/ http://www.welivesecurity.com/2015/07/16/united-airlines-pays-2-million-flight-miles-security-bugs/#comments Thu, 16 Jul 2015 12:12:54 +0000 http://www.welivesecurity.com/?p=65795 United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.

The post United Airlines pays out 2 million flight miles for security bugs appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/16/united-airlines-pays-2-million-flight-miles-security-bugs/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/United_airlines_640.jpg
Dozens arrested in international Darkode crackdown http://www.welivesecurity.com/2015/07/15/dozens-arrested-international-darkode-crackdown/ http://www.welivesecurity.com/2015/07/15/dozens-arrested-international-darkode-crackdown/#comments Wed, 15 Jul 2015 14:11:39 +0000 http://www.welivesecurity.com/?p=65748 International law enforcement agencies have arrested more than 60 people suspected of carrying out cybercrime associated with the Darkode forum.

The post Dozens arrested in international Darkode crackdown appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/15/dozens-arrested-international-darkode-crackdown/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/hacker_keyboard_640.jpg
5 ways attackers are targeting gamers http://www.welivesecurity.com/2015/07/15/5-ways-attackers-are-targeting-gamers/ http://www.welivesecurity.com/2015/07/15/5-ways-attackers-are-targeting-gamers/#comments Wed, 15 Jul 2015 10:23:58 +0000 http://www.welivesecurity.com/?p=65473 Gamers beware – video games, websites and even apps are all in the sights of hackers hungry for better scores, more money and public notoriety.

The post 5 ways attackers are targeting gamers appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/15/5-ways-attackers-are-targeting-gamers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/08/shutterstock_277673564-623x410.jpg
What is an exploit? http://www.welivesecurity.com/videos/exploit/ http://www.welivesecurity.com/videos/exploit/#comments Tue, 14 Jul 2015 14:32:18 +0000 http://www.welivesecurity.com/?post_type=post_video&p=65702 Cybercriminals constantly use vulnerabilities to infiltrate networks, and their favorite tools for this are known as exploits. But what is an exploit?

The post What is an exploit? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/exploit/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/08.jpg
Cheap wifi privacy device pulled with no explanation http://www.welivesecurity.com/2015/07/14/cheap-wifi-privacy-device-pulled-no-explanation/ http://www.welivesecurity.com/2015/07/14/cheap-wifi-privacy-device-pulled-no-explanation/#comments Tue, 14 Jul 2015 13:15:04 +0000 http://www.welivesecurity.com/?p=65691 A planned Defcon talk around a low-cost privacy device called ProxyHam has been cancelled.

The post Cheap wifi privacy device pulled with no explanation appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/14/cheap-wifi-privacy-device-pulled-no-explanation/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/radio_mast_640.jpg
Operation Liberpy: Keyloggers and information theft in Latin America http://www.welivesecurity.com/2015/07/14/operation-liberpy-keyloggers-information-theft-latin-america/ http://www.welivesecurity.com/2015/07/14/operation-liberpy-keyloggers-information-theft-latin-america/#comments Tue, 14 Jul 2015 13:00:27 +0000 http://www.welivesecurity.com/?p=65361 In April, ESET’s Laboratory in Latin America received a report on an executable program named "Liberty2-0.exe." Now, it asks is there a version 1.0?

The post Operation Liberpy: Keyloggers and information theft in Latin America appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/14/operation-liberpy-keyloggers-information-theft-latin-america/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/venezuela-latin-america-1-623x4101.jpg
Tour de France leader Chris Froome has had his data hacked, claims Team Sky http://www.welivesecurity.com/2015/07/14/tour-de-france-leader-chris-froome-data-hacked-claims-team-sky/ http://www.welivesecurity.com/2015/07/14/tour-de-france-leader-chris-froome-data-hacked-claims-team-sky/#comments Tue, 14 Jul 2015 12:29:19 +0000 http://www.welivesecurity.com/?p=65678 Yellow Jersey wearer targeted by critics who claim he has been using performance-enhancing drugs.

The post Tour de France leader Chris Froome has had his data hacked, claims Team Sky appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/14/tour-de-france-leader-chris-froome-data-hacked-claims-team-sky/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/team-sky-623x425.jpeg
Spoofed URLs: Homograph Attacks Revisited http://www.welivesecurity.com/2015/07/14/spoofed-urls-homograph-attacks-revisited/ http://www.welivesecurity.com/2015/07/14/spoofed-urls-homograph-attacks-revisited/#comments Tue, 14 Jul 2015 06:07:11 +0000 http://www.welivesecurity.com/?p=65244 How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn't guarantee a safe site.

The post Spoofed URLs: Homograph Attacks Revisited appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/14/spoofed-urls-homograph-attacks-revisited/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/green-padlock-3.png
Barclays compensates customers after personal data trove uncovered http://www.welivesecurity.com/2015/07/13/barclays-compensates-customers-personal-data-trove-uncovered/ http://www.welivesecurity.com/2015/07/13/barclays-compensates-customers-personal-data-trove-uncovered/#comments Mon, 13 Jul 2015 14:16:49 +0000 http://www.welivesecurity.com/?p=65630 Barclays bank is to pay out around £500,000 in compensation to 2,000 customers whose personal data was found on a USB stick in a flat on the south coast.

The post Barclays compensates customers after personal data trove uncovered appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/13/barclays-compensates-customers-personal-data-trove-uncovered/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/barclays_computer_breach_640.jpg
Millions of records lost in huge OPM US data breach http://www.welivesecurity.com/2015/07/10/millions-records-lost-huge-opm-us-data-breach/ http://www.welivesecurity.com/2015/07/10/millions-records-lost-huge-opm-us-data-breach/#comments Fri, 10 Jul 2015 14:50:27 +0000 http://www.welivesecurity.com/?p=65549 The US Office of Personnel Management has admitted that the widely-publicised data breach in June was more wide-reaching than at first thought.

The post Millions of records lost in huge OPM US data breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/10/millions-records-lost-huge-opm-us-data-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/hacker_headshot_624.jpg
Sednit APT Group Meets Hacking Team http://www.welivesecurity.com/2015/07/10/sednit-apt-group-meets-hacking-team/ http://www.welivesecurity.com/2015/07/10/sednit-apt-group-meets-hacking-team/#comments Fri, 10 Jul 2015 13:52:02 +0000 http://www.welivesecurity.com/?p=65539 The infamous Sednit espionage group is currently using the Hacking Team exploits disclosed earlier this week to target eastern European institutions.

The post Sednit APT Group Meets Hacking Team appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/10/sednit-apt-group-meets-hacking-team/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/shutterstock_175764161-623x4101.jpg
Aspiring singer jailed for hacking Madonna and stealing unreleased tracks http://www.welivesecurity.com/2015/07/10/aspiring-singer-jailed-hacking-madonna-stealing-unreleased-tracks/ http://www.welivesecurity.com/2015/07/10/aspiring-singer-jailed-hacking-madonna-stealing-unreleased-tracks/#comments Fri, 10 Jul 2015 00:10:34 +0000 http://www.welivesecurity.com/?p=65497 Breaking into the music business is one thing. Breaking into Madonna's computer without permission is quite another.

The post Aspiring singer jailed for hacking Madonna and stealing unreleased tracks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/10/aspiring-singer-jailed-hacking-madonna-stealing-unreleased-tracks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/madonna-623x425.jpeg
Adobe rushes to patch Flash flaw under attack http://www.welivesecurity.com/2015/07/09/adobe-rushes-patch-flash-flaw-attack/ http://www.welivesecurity.com/2015/07/09/adobe-rushes-patch-flash-flaw-attack/#comments Thu, 09 Jul 2015 15:47:09 +0000 http://www.welivesecurity.com/?p=65476 Adobe Systems has issued a sizeable security update with patches for 36 vulnerabilities, at least one of which is currently under attack in the wild.

The post Adobe rushes to patch Flash flaw under attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/09/adobe-rushes-patch-flash-flaw-attack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/adobe_patch_640.jpg
Apps on Google Play Steal Facebook Credentials http://www.welivesecurity.com/2015/07/09/apps-google-play-steal-facebook-credentials/ http://www.welivesecurity.com/2015/07/09/apps-google-play-steal-facebook-credentials/#comments Thu, 09 Jul 2015 13:16:20 +0000 http://www.welivesecurity.com/?p=65407 Over 500,000 Android users targeted by phishing apps harvesting their Facebook credentials. ESET detects these trojans as Android/Spy.Feabme.A.

The post Apps on Google Play Steal Facebook Credentials appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/09/apps-google-play-steal-facebook-credentials/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/google-play-malware-623x410.jpg
US petrol stations are vulnerable to cyberattack http://www.welivesecurity.com/2015/07/08/us-petrol-stations-vulnerable-cyberattack/ http://www.welivesecurity.com/2015/07/08/us-petrol-stations-vulnerable-cyberattack/#comments Wed, 08 Jul 2015 16:00:42 +0000 http://www.welivesecurity.com/?p=65411 More than 5,000 devices in petrol stations in the US can be manipulated from the internet, causing false alarms, closure of the petrol station and locking the monitoring services out of the system.

The post US petrol stations are vulnerable to cyberattack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/08/us-petrol-stations-vulnerable-cyberattack/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/gas_station_640.jpg
5 security tips to defeat cybervillains at Comic-Con 2015 http://www.welivesecurity.com/2015/07/08/5-security-tips-defeat-cybervillains-comic-con-2015/ http://www.welivesecurity.com/2015/07/08/5-security-tips-defeat-cybervillains-comic-con-2015/#comments Wed, 08 Jul 2015 14:00:08 +0000 http://www.welivesecurity.com/?p=65365 The crowds at Comic-Con are a tempting target for cybvervillains, so get prepared with these top tips for keeping your data and devices safe.

The post 5 security tips to defeat cybervillains at Comic-Con 2015 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/08/5-security-tips-defeat-cybervillains-comic-con-2015/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/shutterstock_222765055.jpg
T-Mobile received the most US data requisition requests http://www.welivesecurity.com/2015/07/07/t-mobile-received-us-data-requisition-requests/ http://www.welivesecurity.com/2015/07/07/t-mobile-received-us-data-requisition-requests/#comments Tue, 07 Jul 2015 14:32:08 +0000 http://www.welivesecurity.com/?p=65328 Telco T-Mobile’s US arm received more data requests than its larger peers in 2014.

The post T-Mobile received the most US data requisition requests appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/07/t-mobile-received-us-data-requisition-requests/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/shutterstock_259894592.jpg
Open SSL mystery bug to be fixed Thursday July 9 http://www.welivesecurity.com/2015/07/07/open-ssl-mystery-bug-fixed-thursday-july-9/ http://www.welivesecurity.com/2015/07/07/open-ssl-mystery-bug-fixed-thursday-july-9/#comments Tue, 07 Jul 2015 14:18:58 +0000 http://www.welivesecurity.com/?p=65322 A new version of Open SSL is set to be released imminently, patching a single ‘high severity’ vulnerability.

The post Open SSL mystery bug to be fixed Thursday July 9 appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/07/open-ssl-mystery-bug-fixed-thursday-july-9/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/SSL_lock_fix_640.jpg
What I learned at Cyber Boot Camp (Instructor Edition) http://www.welivesecurity.com/2015/07/07/computer-education-gap-cyber-boot-camp/ http://www.welivesecurity.com/2015/07/07/computer-education-gap-cyber-boot-camp/#comments Tue, 07 Jul 2015 13:44:07 +0000 http://www.welivesecurity.com/?p=64864 Teaching computer security to highly motivated students at Cyber Boot Camp reveals a lack of basic computer science education in California Schools.

The post What I learned at Cyber Boot Camp (Instructor Edition) appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2015/07/07/computer-education-gap-cyber-boot-camp/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2015/07/cobb-inclass-at-cyber-boot-camp.jpg