Latest Articles

Facebook: No evidence attackers used stolen access tokens on third-party sites

Facebook: No evidence attackers used stolen access tokens on third-party sites

Facebook: No evidence attackers used stolen access tokens on third-party sites

The social networking behemoth is expected to face a formal investigation by Ireland’s Data Protection Commission in what could be the “acid test” of GDPR since the law took effect in May

Tomáš Foltýn03 Oct 2018


Secure Coding

IT forensic tools: How to find the right one for each incident

IT forensic tools: How to find the right one for each incident

Secure Coding

IT forensic tools: How to find the right one for each incident

Some online resources that will help you find the most suitable IT forensic tools for each case

Lucas Paus03 Oct 2018


Digital Security

Why keeping your cyber-wits about you matters

Why keeping your cyber-wits about you matters

Digital Security

Why keeping your cyber-wits about you matters

WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals

Tomáš Foltýn02 Oct 2018


50 million Facebook users affected in breach

50 million Facebook users affected in breach

50 million Facebook users affected in breach

It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps

Tomáš Foltýn01 Oct 2018


Internet of Things

Top tips for protecting your Smart TV

Top tips for protecting your Smart TV

Internet of Things

Top tips for protecting your Smart TV

The final few months of 2018 will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks

Gabrielle Ladouceur Despins01 Oct 2018


Who’s behind DDoS attacks at UK universities?

Who’s behind DDoS attacks at UK universities?

Who’s behind DDoS attacks at UK universities?

The timing of the attacks suggests that many attempts to take the networks offline may not necessarily be perpetrated by organized cybercriminal gangs

Tomáš Foltýn28 Sep 2018


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

ESET researchers discover LoJax - Week in security with Tony Anscombe

Shane Curtis28 Sep 2018


ESET Research

LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

ESET Research

LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

ESET researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe

ESET Research27 Sep 2018


Twitter patches bug that may have spilled users' private messages

Twitter patches bug that may have spilled users' private messages

Twitter patches bug that may have spilled users' private messages

The flaw affected one of the platform’s APIs between May 2017 and September 10 of this year, when it was patched “within hours”

Tomáš Foltýn26 Sep 2018


Digital Security

Defending your company from cyberattack

Defending your company from cyberattack

Digital Security

Defending your company from cyberattack

ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk

Tomáš Foltýn26 Sep 2018


How To

How to improve hiring practices in cybersecurity

How to improve hiring practices in cybersecurity

How To

How to improve hiring practices in cybersecurity

Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry?

Lysa Myers25 Sep 2018


The Occasional Orator Part 2

The Occasional Orator Part 2

The Occasional Orator Part 2

Public speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message

David Harley24 Sep 2018


Threat Report
MSP Program