We Live Security » Languages » English http://www.welivesecurity.com Security news, views and insight from the ESET experts Fri, 21 Nov 2014 21:08:35 +0000 en-US hourly 1 Week in Security: Grief for gamers, Unicorn spotted – and America wakes up http://www.welivesecurity.com/2014/11/21/week-security-grief-gamers-unicorn-spotted-america-wakes/ http://www.welivesecurity.com/2014/11/21/week-security-grief-gamers-unicorn-spotted-america-wakes/#comments Fri, 21 Nov 2014 21:07:21 +0000 Week in Security: Grief for gamers, Unicorn spotted – and America wakes up http://www.welivesecurity.com/?p=54748 Cybercriminals once again had gamers in their sights this week, with leaks of multiple account details and a new Steam scam - but there was good news in the form of upgraded security on Whatsapp, and dawning awareness on privacy.

The post Week in Security: Grief for gamers, Unicorn spotted – and America wakes up appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/21/week-security-grief-gamers-unicorn-spotted-america-wakes/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/unsafeonline.jpg
Facebook scams – ‘Naked woman eaten by shark’ is latest bait http://www.welivesecurity.com/2014/11/21/facebook-scams-2/ http://www.welivesecurity.com/2014/11/21/facebook-scams-2/#comments Fri, 21 Nov 2014 20:30:11 +0000 Facebook scams – ‘Naked woman eaten by shark’ is latest bait http://www.welivesecurity.com/?p=54741 The latest salacious video - promising ‘Naked Woman Eaten by a Shark’ - is just one in a long chain of viral video scams spread via Faceboook.

The post Facebook scams – ‘Naked woman eaten by shark’ is latest bait appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/21/facebook-scams-2/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/sharkattack.png
Study shows how subjects respond to security warnings… and being ‘hacked’ http://www.welivesecurity.com/2014/11/21/study-shows-subjects-respond-security-warnings-hacked/ http://www.welivesecurity.com/2014/11/21/study-shows-subjects-respond-security-warnings-hacked/#comments Fri, 21 Nov 2014 17:47:33 +0000 Study shows how subjects respond to security warnings… and being ‘hacked’ http://www.welivesecurity.com/?p=54732 Security warnings are routinely ignored, according to a new study by Brigham Young University, which also cast interesting insight in what people's reactions are when they realize their computer has been compromised, according to News Room America.

The post Study shows how subjects respond to security warnings… and being ‘hacked’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/21/study-shows-subjects-respond-security-warnings-hacked/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Sednit-Espionage-Group-Attacking-Air-Gapped-Networks-623x4101.jpg
DerpTrolling leaks 5,604 logins for PSN, 2K and Windows Live http://www.welivesecurity.com/2014/11/21/derptrolling-leaks-5604-logins-psn-2k-windows-live/ http://www.welivesecurity.com/2014/11/21/derptrolling-leaks-5604-logins-psn-2k-windows-live/#comments Fri, 21 Nov 2014 17:21:07 +0000 DerpTrolling leaks 5,604 logins for PSN, 2K and Windows Live http://www.welivesecurity.com/?p=54722 Hacking group DerpTrolling has leaked 5,604 logins for three gaming networks to Pastebin, and claims that this is a "very small portion" of the credentials they have stolen, LifeHacker reports.

The post DerpTrolling leaks 5,604 logins for PSN, 2K and Windows Live appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/21/derptrolling-leaks-5604-logins-psn-2k-windows-live/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/psn-hacked.jpg
More than half of British firms ‘would consider hiring hackers’ http://www.welivesecurity.com/2014/11/20/hackers/ http://www.welivesecurity.com/2014/11/20/hackers/#comments Thu, 20 Nov 2014 18:26:25 +0000 More than half of British firms ‘would consider hiring hackers’ http://www.welivesecurity.com/?p=54668 More than half of British firms would consider hiring computer hackers in the face of a severe skills shortage - and more than 50% of executives said that they would consider hiring an expert even if they had a criminal record

The post More than half of British firms ‘would consider hiring hackers’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/20/hackers/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/handcuffs.jpg
Wireless attacks against ‘air gapped’ targets are possible, Israeli team claims http://www.welivesecurity.com/2014/11/20/airgapped/ http://www.welivesecurity.com/2014/11/20/airgapped/#comments Thu, 20 Nov 2014 18:08:08 +0000 Wireless attacks against ‘air gapped’ targets are possible, Israeli team claims http://www.welivesecurity.com/?p=54662 A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air-gapped network, install malware, and retreive information - without using hardware such as USB keys.

The post Wireless attacks against ‘air gapped’ targets are possible, Israeli team claims appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/20/airgapped/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/pckeyboard1500.jpg
Footage from thousands of home webcams found streaming on Russian site http://www.welivesecurity.com/2014/11/20/footage-thousands-home-webcams-found-streaming-russian-site/ http://www.welivesecurity.com/2014/11/20/footage-thousands-home-webcams-found-streaming-russian-site/#comments Thu, 20 Nov 2014 13:20:23 +0000 Footage from thousands of home webcams found streaming on Russian site http://www.welivesecurity.com/?p=54628 A Russian website is showing off hundreds of feeds of live webcam footage from inside homes and businesses, which have been accessed by hacking into people’s webcams, CCTV systems and monitors.

The post Footage from thousands of home webcams found streaming on Russian site appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/20/footage-thousands-home-webcams-found-streaming-russian-site/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/webcam.jpg
First exploitation of Internet Explorer ‘Unicorn bug’ in-the-wild http://www.welivesecurity.com/2014/11/20/first-exploitation-of-unicorn-bug/ http://www.welivesecurity.com/2014/11/20/first-exploitation-of-unicorn-bug/#comments Thu, 20 Nov 2014 11:28:11 +0000 First exploitation of Internet Explorer ‘Unicorn bug’ in-the-wild http://www.welivesecurity.com/?p=54591 Microsoft released a patch last week for a critical vulnerability allowing remote code execution in Internet Explorer. This vulnerability is significant because it exploits an old bug present in Internet Explorer versions 3 through 11.

The post First exploitation of Internet Explorer ‘Unicorn bug’ in-the-wild appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/20/first-exploitation-of-unicorn-bug/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/unicorn_bug1.jpg
WhatsApp gets tough on security http://www.welivesecurity.com/2014/11/19/whatsapp-gets-end-end-encryption/ http://www.welivesecurity.com/2014/11/19/whatsapp-gets-end-end-encryption/#comments Wed, 19 Nov 2014 17:13:23 +0000 WhatsApp gets tough on security http://www.welivesecurity.com/?p=54566 But only on Android for now. The popular messaging service has announced a default encryption protocol that surely makes WhatsApp THE most secure consumer messaging system in the world right now.

The post WhatsApp gets tough on security appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/19/whatsapp-gets-end-end-encryption/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/whatsapp_cifrado.jpg
U.S. State Department shuts down entire email system after suspected attack http://www.welivesecurity.com/2014/11/18/email-security/ http://www.welivesecurity.com/2014/11/18/email-security/#comments Tue, 18 Nov 2014 13:57:37 +0000 U.S. State Department shuts down entire email system after suspected attack http://www.welivesecurity.com/?p=54513 The U.S. State Department has shut down its entire unclassified email system after a suspected intrusion - and technicians are now working to beef up email security systems.

The post U.S. State Department shuts down entire email system after suspected attack appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/18/email-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/eeeevilhand.jpg
Steam gamers targeted with ‘free screensaver’ phishing scam http://www.welivesecurity.com/2014/11/18/steam/ http://www.welivesecurity.com/2014/11/18/steam/#comments Tue, 18 Nov 2014 13:41:44 +0000 Steam gamers targeted with ‘free screensaver’ phishing scam http://www.welivesecurity.com/?p=54505 Gamers on the popular Steam gaming service have been targeted with phishing scams via the service’s popular Marketplace - with apparent ‘bargains’ offering a sting in the tail.

The post Steam gamers targeted with ‘free screensaver’ phishing scam appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/18/steam/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Advanced-Warfare-2.jpg
Privacy and security post-Snowden: Pew Research parallels ESET findings http://www.welivesecurity.com/2014/11/17/privacy-security-post-snowden-pew-research-confirms-eset-findings/ http://www.welivesecurity.com/2014/11/17/privacy-security-post-snowden-pew-research-confirms-eset-findings/#comments Mon, 17 Nov 2014 17:42:36 +0000 Privacy and security post-Snowden: Pew Research parallels ESET findings http://www.welivesecurity.com/?p=54300 Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring similar results from two different privacy and security surveys conducted by ESET.

The post Privacy and security post-Snowden: Pew Research parallels ESET findings appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/17/privacy-security-post-snowden-pew-research-confirms-eset-findings/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/peeping-tom.png
Public Wi-Fi hotspots – know the risks http://www.welivesecurity.com/2014/11/14/public-wi-fi-hotspots-know-risks/ http://www.welivesecurity.com/2014/11/14/public-wi-fi-hotspots-know-risks/#comments Fri, 14 Nov 2014 17:34:59 +0000 Public Wi-Fi hotspots – know the risks http://www.welivesecurity.com/?p=54388 For ordinary laptop and smartphone users, Wi-Fi is not ideal - but it’s sometimes near-inescapable.

The post Public Wi-Fi hotspots – know the risks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/14/public-wi-fi-hotspots-know-risks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/wifi_gratis.jpg
Nexus 5, Galaxy S5 and iPhone 5s hacked at Pwn2Own event http://www.welivesecurity.com/2014/11/14/nexus-5-galaxy-s5-iphone-5s-hacked-pwn2own-event/ http://www.welivesecurity.com/2014/11/14/nexus-5-galaxy-s5-iphone-5s-hacked-pwn2own-event/#comments Fri, 14 Nov 2014 17:15:24 +0000 Nexus 5, Galaxy S5 and iPhone 5s hacked at Pwn2Own event http://www.welivesecurity.com/?p=54362 The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the Mobile Pwn2Own hacking competition, reports Forbes.

The post Nexus 5, Galaxy S5 and iPhone 5s hacked at Pwn2Own event appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/14/nexus-5-galaxy-s5-iphone-5s-hacked-pwn2own-event/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/iphone-5s-galaxy-s5-and-nexus-5-pwn2own.jpg
5 new iOS 8 features that make your iPhone safer than ever http://www.welivesecurity.com/videos/5-new-ios8-features-make-iphone-safer-ever/ http://www.welivesecurity.com/videos/5-new-ios8-features-make-iphone-safer-ever/#comments Fri, 14 Nov 2014 16:36:10 +0000 5 new iOS 8 features that make your iPhone safer than ever http://www.welivesecurity.com/?post_type=post_video&p=54387 The recent release of Apple’s iPhone 6 was coupled with the upgrade in software to iOS 8. This new operating system has come with a host of new features including these 5 that will make your phone safer than ever.

The post 5 new iOS 8 features that make your iPhone safer than ever appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/5-new-ios8-features-make-iphone-safer-ever/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/011.jpg
How to stay safe on Snapchat http://www.welivesecurity.com/videos/snapchat-security/ http://www.welivesecurity.com/videos/snapchat-security/#comments Fri, 14 Nov 2014 16:30:35 +0000 How to stay safe on Snapchat http://www.welivesecurity.com/?post_type=post_video&p=54383 Snapchat promises self destructing photos, but the recent leak of 13GB of snapchat images through a 3rd part website has left users questioning the app. Here are 5 things to remember when using Snapchat.

The post How to stay safe on Snapchat appeared first on We Live Security.

]]>
http://www.welivesecurity.com/videos/snapchat-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/010.jpg
G20 2014 Summit Lure used to target Tibetan activists http://www.welivesecurity.com/2014/11/14/targeted-attacks-tibetan-advocates-using-g20-2014-summit-lure/ http://www.welivesecurity.com/2014/11/14/targeted-attacks-tibetan-advocates-using-g20-2014-summit-lure/#comments Fri, 14 Nov 2014 15:29:58 +0000 G20 2014 Summit Lure used to target Tibetan activists http://www.welivesecurity.com/?p=54371 APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.

The post G20 2014 Summit Lure used to target Tibetan activists appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/14/targeted-attacks-tibetan-advocates-using-g20-2014-summit-lure/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/147403406_932471f775_z.jpg
MasterCard and Visa to end password authentication http://www.welivesecurity.com/2014/11/14/mastercard-visa-end-password-authentication/ http://www.welivesecurity.com/2014/11/14/mastercard-visa-end-password-authentication/#comments Fri, 14 Nov 2014 13:55:00 +0000 MasterCard and Visa to end password authentication http://www.welivesecurity.com/?p=54352 MasterCard and VISA have revealed their plan to end the use of passwords for online payments, reports The Telegraph.

The post MasterCard and Visa to end password authentication appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/14/mastercard-visa-end-password-authentication/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/mastercard-and-visa-to-stop-password-authentication.jpg
IT Pros also guilty of risqué selfies on mobiles http://www.welivesecurity.com/2014/11/14/it-pros-also-guilty-of-risque-selfies-on-mobiles/ http://www.welivesecurity.com/2014/11/14/it-pros-also-guilty-of-risque-selfies-on-mobiles/#comments Fri, 14 Nov 2014 09:30:08 +0000 IT Pros also guilty of risqué selfies on mobiles http://www.welivesecurity.com/?p=54297 ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them embarrassed if lost.

The post IT Pros also guilty of risqué selfies on mobiles appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/14/it-pros-also-guilty-of-risque-selfies-on-mobiles/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/15018432003_0b60234ddf_b-e1415991231951.jpg
BadUSB potential not as widespread as originally thought, but remains difficult to avoid http://www.welivesecurity.com/2014/11/13/badusb-potential-widespread-originally-thought-remains-difficult-avoid/ http://www.welivesecurity.com/2014/11/13/badusb-potential-widespread-originally-thought-remains-difficult-avoid/#comments Thu, 13 Nov 2014 17:25:40 +0000 BadUSB potential not as widespread as originally thought, but remains difficult to avoid http://www.welivesecurity.com/?p=54295 The BadUSB malware which potentially turns any USB stick into a 'unpatchable' malware carrier doesn't quite have the potential for mayhem it was originally feared, according to the researcher who uncovered the exploit.

The post BadUSB potential not as widespread as originally thought, but remains difficult to avoid appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/13/badusb-potential-widespread-originally-thought-remains-difficult-avoid/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/USB-Port.jpg
.NET goes open source and cross-platform http://www.welivesecurity.com/2014/11/13/net-goes-open-source-cross-platform/ http://www.welivesecurity.com/2014/11/13/net-goes-open-source-cross-platform/#comments Thu, 13 Nov 2014 16:43:08 +0000 .NET goes open source and cross-platform http://www.welivesecurity.com/?p=54292 Microsoft's .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.

The post .NET goes open source and cross-platform appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/13/net-goes-open-source-cross-platform/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/microsoft_open_source.jpg
Microsoft discovers vulnerability in all versions of Windows – patch available http://www.welivesecurity.com/2014/11/12/microsoft-discovers-vulnerability-versions-windows-patch-available/ http://www.welivesecurity.com/2014/11/12/microsoft-discovers-vulnerability-versions-windows-patch-available/#comments Wed, 12 Nov 2014 17:01:03 +0000 Microsoft discovers vulnerability in all versions of Windows – patch available http://www.welivesecurity.com/?p=54240 Microsoft has uncovered a flaw in all supported versions of Microsoft Windows that could allow hundreds of millions of computers to be taken over by a remote attacker, International Business Times reports.

The post Microsoft discovers vulnerability in all versions of Windows – patch available appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/12/microsoft-discovers-vulnerability-versions-windows-patch-available/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Microsoft-windows-vulnerability-found.jpg
Snapchat urges users to disconnect third party apps after breach http://www.welivesecurity.com/2014/11/12/snapchat-urges-users-disconnect-third-party-apps-breach/ http://www.welivesecurity.com/2014/11/12/snapchat-urges-users-disconnect-third-party-apps-breach/#comments Wed, 12 Nov 2014 15:27:17 +0000 Snapchat urges users to disconnect third party apps after breach http://www.welivesecurity.com/?p=54223 Following last month's leak of 13gb worth of private Snapchat videos, the vanishing message service has announced a new policy whereby it will automatically detect third-party apps, and advise users to disconnect them, reports Tech Crunch.

The post Snapchat urges users to disconnect third party apps after breach appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/12/snapchat-urges-users-disconnect-third-party-apps-breach/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/snapchat.jpg
Korplug military targeted attacks: Afghanistan & Tajikistan http://www.welivesecurity.com/2014/11/12/korplug-military-targeted-attacks-afghanistan-tajikistan/ http://www.welivesecurity.com/2014/11/12/korplug-military-targeted-attacks-afghanistan-tajikistan/#comments Wed, 12 Nov 2014 15:17:17 +0000 Korplug military targeted attacks: Afghanistan & Tajikistan http://www.welivesecurity.com/?p=54200 After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one

The post Korplug military targeted attacks: Afghanistan & Tajikistan appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/12/korplug-military-targeted-attacks-afghanistan-tajikistan/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/korplug_rat.jpg
Website reveals 73,000 unprotected security cameras with default passwords http://www.welivesecurity.com/2014/11/11/website-reveals-73000-unprotected-security-cameras-default-passwords/ http://www.welivesecurity.com/2014/11/11/website-reveals-73000-unprotected-security-cameras-default-passwords/#comments Tue, 11 Nov 2014 17:13:28 +0000 Website reveals 73,000 unprotected security cameras with default passwords http://www.welivesecurity.com/?p=54191 As we've reported before, users and businesses leaving their router username and passwords as the manufacturer's default are potentially leaving themselves open to an easy hack, but a new website has sprung up illustrating the point in alarming detail.

The post Website reveals 73,000 unprotected security cameras with default passwords appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/11/website-reveals-73000-unprotected-security-cameras-default-passwords/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Website-reveals-73000-unprotected-security-cameras-with-default-passwords.jpg
Sednit Espionage Group Attacking Air-Gapped Networks http://www.welivesecurity.com/2014/11/11/sednit-espionage-group-attacking-air-gapped-networks/ http://www.welivesecurity.com/2014/11/11/sednit-espionage-group-attacking-air-gapped-networks/#comments Tue, 11 Nov 2014 12:19:37 +0000 Sednit Espionage Group Attacking Air-Gapped Networks http://www.welivesecurity.com/?p=53969 The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- “air-gapped” networks -- and exfiltrate sensitive files from them through removable drives.

The post Sednit Espionage Group Attacking Air-Gapped Networks appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/11/sednit-espionage-group-attacking-air-gapped-networks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Sednit-Espionage-Group-Attacking-Air-Gapped-Networks-623x4101.jpg
Kickstarter campaigns wants your password on your wrist http://www.welivesecurity.com/2014/11/10/kickstarter-campaigns-wants-password-wrist/ http://www.welivesecurity.com/2014/11/10/kickstarter-campaigns-wants-password-wrist/#comments Mon, 10 Nov 2014 17:18:15 +0000 Kickstarter campaigns wants your password on your wrist http://www.welivesecurity.com/?p=54099 A new wristband that aims to replace the password has launched a crowdfunding campaign on Kickstarter. At the time of writing, Everykey has passed the halfway mark on its $100,000 funding target with $56,586 pledged with 19 days to reach $100,000. Using Bluetooth, the Everykey promises “immediate access to a user’s password-protected electronics such as

The post Kickstarter campaigns wants your password on your wrist appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/10/kickstarter-campaigns-wants-password-wrist/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/89f82898359ebb707d1b3578b3b80329_large.jpg
Realistic looking phishing websites work 45% of the time, Google claims http://www.welivesecurity.com/2014/11/10/realistic-looking-phishing-websites-work-45-time-google-claims/ http://www.welivesecurity.com/2014/11/10/realistic-looking-phishing-websites-work-45-time-google-claims/#comments Mon, 10 Nov 2014 16:15:16 +0000 Realistic looking phishing websites work 45% of the time, Google claims http://www.welivesecurity.com/?p=54093 Google has teamed up with the University of California in San Diego to publish surprising new research about phishing, how effective it is and how scammers work their phishing operations.

The post Realistic looking phishing websites work 45% of the time, Google claims appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/10/realistic-looking-phishing-websites-work-45-time-google-claims/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/phishing-websites-work-45-percent-of-the-time.jpg
Amazon phishing scams hit over 750,000 Brits http://www.welivesecurity.com/2014/11/07/amazon-phishing-scams-hit-750000-brits/ http://www.welivesecurity.com/2014/11/07/amazon-phishing-scams-hit-750000-brits/#comments Fri, 07 Nov 2014 17:08:59 +0000 Amazon phishing scams hit over 750,000 Brits http://www.welivesecurity.com/?p=54014 Although phishing scams are something everyone should always be vigilant to, AppRiver has identified two specific Amazon types which are currently targeting the UK market, Tech Week Europe reports.

The post Amazon phishing scams hit over 750,000 Brits appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/07/amazon-phishing-scams-hit-750000-brits/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Amazon-phishing-emails.jpg
Home Depot breach: hackers took 53 million email addresses http://www.welivesecurity.com/2014/11/07/home-depot-breach-hackers-took-53-million-email-addresses/ http://www.welivesecurity.com/2014/11/07/home-depot-breach-hackers-took-53-million-email-addresses/#comments Fri, 07 Nov 2014 16:22:39 +0000 Home Depot breach: hackers took 53 million email addresses http://www.welivesecurity.com/?p=53995 September's breach of Home Depot that saw 56 million sets of credit and debit card data stolen was not the only thing lost in the leak, the company has revealed.

The post Home Depot breach: hackers took 53 million email addresses appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/07/home-depot-breach-hackers-took-53-million-email-addresses/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/09/hoomedepot3.jpg
Apple Pay and security – what you need to know http://www.welivesecurity.com/2014/11/07/apple-pay-security-need-know/ http://www.welivesecurity.com/2014/11/07/apple-pay-security-need-know/#comments Fri, 07 Nov 2014 15:12:46 +0000 Apple Pay and security – what you need to know http://www.welivesecurity.com/?p=53985 Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.

The post Apple Pay and security – what you need to know appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/07/apple-pay-security-need-know/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/applepaymain-e1415372802180.png
Dark Web drug trade site Silk Road 2.0 shut down http://www.welivesecurity.com/2014/11/07/dark-web-drug-trade-site-silk-road-2-0-seized-feds/ http://www.welivesecurity.com/2014/11/07/dark-web-drug-trade-site-silk-road-2-0-seized-feds/#comments Fri, 07 Nov 2014 14:07:49 +0000 Dark Web drug trade site Silk Road 2.0 shut down http://www.welivesecurity.com/?p=53959 A year ago, Silk Road 2 appeared on the dark web, after the original Silk Road site's illegal drug trade was shut down by the FBI. Now, Wired reports Silk Road 2 has met a similar fate to its predecessor.

The post Dark Web drug trade site Silk Road 2.0 shut down appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/07/dark-web-drug-trade-site-silk-road-2-0-seized-feds/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/sr20.png
Google security – how to lock down your Google account http://www.welivesecurity.com/2014/11/06/google-security/ http://www.welivesecurity.com/2014/11/06/google-security/#comments Thu, 06 Nov 2014 16:55:15 +0000 Google security – how to lock down your Google account http://www.welivesecurity.com/?p=53904 If you use Gmail as your ‘main’ email account - or rely on Google services such as Drive for work - it’s well worth revisiting Google’s Settings menus to give your Google security a boost.

The post Google security – how to lock down your Google account appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/06/google-security/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/How-to-make-your-google-account-secure.jpg
Government requests for private Facebook data up 24% http://www.welivesecurity.com/2014/11/06/government-requests-private-facebook-data-24/ http://www.welivesecurity.com/2014/11/06/government-requests-private-facebook-data-24/#comments Thu, 06 Nov 2014 16:30:59 +0000 Government requests for private Facebook data up 24% http://www.welivesecurity.com/?p=53875 Government requests for private Facebook data have increased by nearly 25% since the second half of 2013, the social networking giant has reported.

The post Government requests for private Facebook data up 24% appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/06/government-requests-private-facebook-data-24/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Facebook-gets-requests-from-governments.jpg
WireLurker: new malware targets Apple users http://www.welivesecurity.com/2014/11/06/wirelurker-new-malware-targets-iphones-macs/ http://www.welivesecurity.com/2014/11/06/wirelurker-new-malware-targets-iphones-macs/#comments Thu, 06 Nov 2014 15:28:47 +0000 WireLurker: new malware targets Apple users http://www.welivesecurity.com/?p=53867 A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.

The post WireLurker: new malware targets Apple users appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/06/wirelurker-new-malware-targets-iphones-macs/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/wirelurker_iphone_mac.jpg
British intelligence service echoes FBI’s call for mobile backdoors http://www.welivesecurity.com/2014/11/05/british-intelligence-service-echoes-fbis-call-for-mobile-backdoors/ http://www.welivesecurity.com/2014/11/05/british-intelligence-service-echoes-fbis-call-for-mobile-backdoors/#comments Wed, 05 Nov 2014 11:52:53 +0000 British intelligence service echoes FBI’s call for mobile backdoors http://www.welivesecurity.com/?p=53795 Echoing sentiments from across the Atlantic earlier in the year, the head of British spy agency GCHQ as made calls for crypto backdoors into phones to tackle crime, stating, "privacy has never been an absolute right."

The post British intelligence service echoes FBI’s call for mobile backdoors appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/05/british-intelligence-service-echoes-fbis-call-for-mobile-backdoors/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/gchq-want-backdoors-into-mobiles.jpg
Biometric wristband piloted by Canadian bank http://www.welivesecurity.com/2014/11/05/biometric-wristband-piloted-canadian-bank/ http://www.welivesecurity.com/2014/11/05/biometric-wristband-piloted-canadian-bank/#comments Wed, 05 Nov 2014 10:41:38 +0000 Biometric wristband piloted by Canadian bank http://www.welivesecurity.com/?p=53775 A group of Canadian issuing banks have begun a pilot test of an NFC-enabled version of Nymi - a biometric wristband that uses the cardiac rhythm of the wearer to authenticate the user's identity.

The post Biometric wristband piloted by Canadian bank appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/05/biometric-wristband-piloted-canadian-bank/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/royal-bank-of-canada-biometric-wristband.jpg
American Express wants to swap card numbers for tokens http://www.welivesecurity.com/2014/11/04/american-express-wants-swap-card-numbers-tokens/ http://www.welivesecurity.com/2014/11/04/american-express-wants-swap-card-numbers-tokens/#comments Tue, 04 Nov 2014 15:10:50 +0000 American Express wants to swap card numbers for tokens http://www.welivesecurity.com/?p=53762 American Express has launched a new service, which looks to swap payment card numbers with unique tokens, reports Network World.

The post American Express wants to swap card numbers for tokens appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/04/american-express-wants-swap-card-numbers-tokens/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/amex.jpg
Hacking planes – researchers developing system to stop in-flight malware http://www.welivesecurity.com/2014/11/04/hacking-planes-researchers-developing-system-stop-flight-malware/ http://www.welivesecurity.com/2014/11/04/hacking-planes-researchers-developing-system-stop-flight-malware/#comments Tue, 04 Nov 2014 12:36:42 +0000 Hacking planes – researchers developing system to stop in-flight malware http://www.welivesecurity.com/?p=53752 City University professor Dr David Stupples and a team of researchers are looking into ways of minimizing the risk of hacking planes in the future.

The post Hacking planes – researchers developing system to stop in-flight malware appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/04/hacking-planes-researchers-developing-system-stop-flight-malware/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/airplane-malware-protection.jpg
Global cybersecurity skills shortage incoming, committee warns Britain’s House of Lords http://www.welivesecurity.com/2014/11/03/global-cybersecurity-skills-shortage-incoming-warns-house-lords-committee/ http://www.welivesecurity.com/2014/11/03/global-cybersecurity-skills-shortage-incoming-warns-house-lords-committee/#comments Mon, 03 Nov 2014 17:35:47 +0000 Global cybersecurity skills shortage incoming, committee warns Britain’s House of Lords http://www.welivesecurity.com/?p=53737 A special Parliamentary Select Committee has told peers in the United Kingdom's House of Lords that there will be a global shortage of " no less than two million cyber security professionals" by the year 2017, IT Pro Portal reports.

The post Global cybersecurity skills shortage incoming, committee warns Britain’s House of Lords appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/03/global-cybersecurity-skills-shortage-incoming-warns-house-lords-committee/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/House-of-lords.jpg
Rise of free Wi-Fi hotspots ‘presents serious security risks’ http://www.welivesecurity.com/2014/11/03/rise-free-wi-fi-hotspots-presents-serious-security-risks/ http://www.welivesecurity.com/2014/11/03/rise-free-wi-fi-hotspots-presents-serious-security-risks/#comments Mon, 03 Nov 2014 16:48:14 +0000 Rise of free Wi-Fi hotspots ‘presents serious security risks’ http://www.welivesecurity.com/?p=53718 The BBC reports that there is currently one Wi-Fi hotspot for every 150 people in the world, but these unmonitored hotspots can potentially cause problems, experts have warned.

The post Rise of free Wi-Fi hotspots ‘presents serious security risks’ appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/11/03/rise-free-wi-fi-hotspots-presents-serious-security-risks/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/free-wifi-presents-serious-security-risks.jpg
Facebook welcomes private browsers with dedicated Tor link http://www.welivesecurity.com/2014/10/31/facebook-welcomes-private-browsers-dedicated-tor-link/ http://www.welivesecurity.com/2014/10/31/facebook-welcomes-private-browsers-dedicated-tor-link/#comments Fri, 31 Oct 2014 17:45:32 +0000 Facebook welcomes private browsers with dedicated Tor link http://www.welivesecurity.com/?p=53692 Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.

The post Facebook welcomes private browsers with dedicated Tor link appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/31/facebook-welcomes-private-browsers-dedicated-tor-link/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Facebook-opens-dedicated-Tor-link.jpg
Microsoft issues rapid fix to GroupMe exploit http://www.welivesecurity.com/2014/10/31/microsoft-issues-rapid-fix-groupme-exploit/ http://www.welivesecurity.com/2014/10/31/microsoft-issues-rapid-fix-groupme-exploit/#comments Fri, 31 Oct 2014 17:04:21 +0000 Microsoft issues rapid fix to GroupMe exploit http://www.welivesecurity.com/?p=53687 iOS and Android messaging app GroupMe has had a possible vulnerability fixed quickly by Microsoft, according to The Register. There was no evidence to suggest any cybercriminals had been able to exploit the flaw before it was patched.

The post Microsoft issues rapid fix to GroupMe exploit appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/31/microsoft-issues-rapid-fix-groupme-exploit/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Microsoft-patches-GroupMe.jpg
Two recently patched Adobe Flash vulnerabilities now used in Exploit Kits http://www.welivesecurity.com/2014/10/31/two-recently-patched-adobe-flash-vulnerabilities-now-used-exploit-kits/ http://www.welivesecurity.com/2014/10/31/two-recently-patched-adobe-flash-vulnerabilities-now-used-exploit-kits/#comments Fri, 31 Oct 2014 16:12:35 +0000 Two recently patched Adobe Flash vulnerabilities now used in Exploit Kits http://www.welivesecurity.com/?p=53637 Two Flash vulnerabilities that were fixed by Adobe 2 weeks ago are now being used in exploit kits. This is in addition to a third vulnerability, CVE-2014-0556, that was patched in September and that has also been added to Nuclear EK last week.

The post Two recently patched Adobe Flash vulnerabilities now used in Exploit Kits appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/31/two-recently-patched-adobe-flash-vulnerabilities-now-used-exploit-kits/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/patch.jpg
Police can make you unlock your phone with a fingerprint – judge http://www.welivesecurity.com/2014/10/31/police-can-make-unlock-phone-fingerprint-judge/ http://www.welivesecurity.com/2014/10/31/police-can-make-unlock-phone-fingerprint-judge/#comments Fri, 31 Oct 2014 16:11:21 +0000 Police can make you unlock your phone with a fingerprint – judge http://www.welivesecurity.com/?p=53670 A judge in Virginia has ruled that the police can require you to unlock your smartphone with a fingerprint, but not with a passcode, Mashable reports.

The post Police can make you unlock your phone with a fingerprint – judge appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/31/police-can-make-unlock-phone-fingerprint-judge/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Touch-ID.jpg
How to make sure Adobe Flash is up-to-date and enabling it on-demand http://www.welivesecurity.com/2014/10/31/how-to-update-adobe-flash/ http://www.welivesecurity.com/2014/10/31/how-to-update-adobe-flash/#comments Fri, 31 Oct 2014 15:51:44 +0000 How to make sure Adobe Flash is up-to-date and enabling it on-demand http://www.welivesecurity.com/?p=53643 Learn how to update Adobe Flash Player, to help protect against malware attacks.

The post How to make sure Adobe Flash is up-to-date and enabling it on-demand appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/31/how-to-update-adobe-flash/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/11/Adobe-flash-exploit-kit.jpg
“More human” carder malware emerges for sale in dark web http://www.welivesecurity.com/2014/10/30/human-carder-malware-emerges-sale-dark-web/ http://www.welivesecurity.com/2014/10/30/human-carder-malware-emerges-sale-dark-web/#comments Thu, 30 Oct 2014 17:36:29 +0000 “More human” carder malware emerges for sale in dark web http://www.welivesecurity.com/?p=53581 A carder like tool for cybercriminals that promises to use stolen credit card details in a more 'human way' to bypass fraud detection has been found on sale for as little as $180, according to The Register.

The post “More human” carder malware emerges for sale in dark web appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/30/human-carder-malware-emerges-sale-dark-web/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/credit-cards-malware.jpg
Stealthy malware uses Gmail drafts to steal data http://www.welivesecurity.com/2014/10/30/stealthy-malware-uses-gmail-drafts-steal-data/ http://www.welivesecurity.com/2014/10/30/stealthy-malware-uses-gmail-drafts-steal-data/#comments Thu, 30 Oct 2014 16:23:45 +0000 Stealthy malware uses Gmail drafts to steal data http://www.welivesecurity.com/?p=53571 A new strain of malware that uses Gmail drafts in an invisible Internet Explorer window, has been discovered. According to Network World, the malware uses the drafts folder as "the command and control to steal data."

The post Stealthy malware uses Gmail drafts to steal data appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/30/stealthy-malware-uses-gmail-drafts-steal-data/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/Gmail-drafts-malware.jpg
Wearable tech and security – can watches help? http://www.welivesecurity.com/2014/10/30/wearable-tech/ http://www.welivesecurity.com/2014/10/30/wearable-tech/#comments Thu, 30 Oct 2014 15:51:00 +0000 Wearable tech and security – can watches help? http://www.welivesecurity.com/?p=53547 So far, wearable tech has been of interest mainly to fitness fiends - but a new generation of hi-tech wearables comes armed with built-in scanners, biometrics and even 'three-factor security'. Can a watch really keep secrets?

The post Wearable tech and security – can watches help? appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/30/wearable-tech/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/android-wear-e1414677922816.png
Top Cyber Security Awareness Month themes, topics, and resources http://www.welivesecurity.com/2014/10/29/top-cyber-security-awareness-topics-themes-resources/ http://www.welivesecurity.com/2014/10/29/top-cyber-security-awareness-topics-themes-resources/#comments Wed, 29 Oct 2014 17:18:29 +0000 Top Cyber Security Awareness Month themes, topics, and resources http://www.welivesecurity.com/?p=53386 National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).

The post Top Cyber Security Awareness Month themes, topics, and resources appeared first on We Live Security.

]]>
http://www.welivesecurity.com/2014/10/29/top-cyber-security-awareness-topics-themes-resources/feed/ 0 http://www.welivesecurity.com/wp-content/uploads/2014/10/ncsam-2014-10.png