Latest Articles

Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Facebook stolen access tokens issue rumbles on - Week in security with Tony Anscombe

Shane Curtis07 Oct 2018


Virus Bulletin 2018: Supply chain hacking grows up

Virus Bulletin 2018: Supply chain hacking grows up

Virus Bulletin 2018: Supply chain hacking grows up

Striking the balance between supply, demand and safety is a major concern

Cameron Camp05 Oct 2018


Make it a cyber-habit: Five simple steps to staying safe online

Make it a cyber-habit: Five simple steps to staying safe online

Make it a cyber-habit: Five simple steps to staying safe online

What are some essential steps you can take to increase your online safety – now and in the long run?

Tomáš Foltýn05 Oct 2018


Cybercrime

Why ask the public about cybercrime and cybersecurity?

Why ask the public about cybercrime and cybersecurity?

Cybercrime

Why ask the public about cybercrime and cybersecurity?

Answers could help raise awareness of situations that people fear

Stephen Cobb04 Oct 2018


Virus Bulletin 2018: Attack velocity ramps up

Virus Bulletin 2018: Attack velocity ramps up

Virus Bulletin 2018: Attack velocity ramps up

Some tips from the floor of VB 2018 for helping to keep your data more secure

Cameron Camp04 Oct 2018


Facebook: No evidence attackers used stolen access tokens on third-party sites

Facebook: No evidence attackers used stolen access tokens on third-party sites

Facebook: No evidence attackers used stolen access tokens on third-party sites

The social networking behemoth is expected to face a formal investigation by Ireland’s Data Protection Commission in what could be the “acid test” of GDPR since the law took effect in May

Tomáš Foltýn03 Oct 2018


Secure Coding

IT forensic tools: How to find the right one for each incident

IT forensic tools: How to find the right one for each incident

Secure Coding

IT forensic tools: How to find the right one for each incident

Some online resources that will help you find the most suitable IT forensic tools for each case

Lucas Paus03 Oct 2018


Digital Security

Why keeping your cyber-wits about you matters

Why keeping your cyber-wits about you matters

Digital Security

Why keeping your cyber-wits about you matters

WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals

Tomáš Foltýn02 Oct 2018


50 million Facebook users affected in breach

50 million Facebook users affected in breach

50 million Facebook users affected in breach

It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps

Tomáš Foltýn01 Oct 2018


Internet of Things

Top tips for protecting your Smart TV

Top tips for protecting your Smart TV

Internet of Things

Top tips for protecting your Smart TV

The final few months of 2018 will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks

Gabrielle Ladouceur Despins01 Oct 2018


Who’s behind DDoS attacks at UK universities?

Who’s behind DDoS attacks at UK universities?

Who’s behind DDoS attacks at UK universities?

The timing of the attacks suggests that many attempts to take the networks offline may not necessarily be perpetrated by organized cybercriminal gangs

Tomáš Foltýn28 Sep 2018


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET researchers discover LoJax - Week in security with Tony Anscombe

Shane Curtis28 Sep 2018