Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras to put your worries to rest.
The post The spy who rented to me? Throwing the spotlight on hidden cameras in Airbnbs appeared first on WeLiveSecurity
Gather around, folks, to learn about some of the ghastliest tricks used by criminals online and how you can avoid security horrors this Halloween and beyond
The post Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween appeared first on WeLiveSecurity
A look at a recent string of law enforcement actions directed against (in some cases suspected) perpetrators of various types of cybercrime
The post Courts vs. cybercrime – Week in security with Tony Anscombe appeared first on WeLiveSecurity
You probably don’t have to ditch your phone just yet – try these simple tips and tricks to make any Android device or iPhone run faster
The post Why your phone is slow – and how to speed it up appeared first on WeLiveSecurity
As package delivery scams that spoof DHL, USPS and other delivery companies soar, here’s how to stay safe not just this shopping season
The post Parcel delivery scams are on the rise: Do you know what to watch out for? appeared first on WeLiveSecurity
Next time you're tempted to hold off on installing software updates, remember why these updates are necessary in the first place
The post 5 reasons to keep your software and devices up to date appeared first on WeLiveSecurity
ESET Research spots a new version of Android malware known as FurBall that APT-C-50 is using in its wider Domestic Kitten campaign
The post APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe appeared first on WeLiveSecurity
APT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app
The post Domestic Kitten campaign spying on Iranian citizens with new FurBall malware appeared first on WeLiveSecurity
With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force
The post Don’t get scammed when buying tickets online appeared first on WeLiveSecurity
What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay?
The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity
More than a dozen organizations operating in various verticals were attacked by the threat actor
The post ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe appeared first on WeLiveSecurity
From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell.
The post Life in pursuit of answers: In the words of Ada Yonath appeared first on WeLiveSecurity
Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep your money safe while using the popular P2P payment service.
The post 10 common Zelle scams – and how to avoid them appeared first on WeLiveSecurity
ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group
The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity
What are the warning signs that someone has hijacked your Steam account? Here is what to look for and what you can do to get your account back.
The post Steam account hacked? Here’s how to get it back appeared first on WeLiveSecurity
A look back on the key trends and developments that shaped the cyberthreat landscape from May to August of this year
The post Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits
The post The need to change cybersecurity for the next generation appeared first on WeLiveSecurity
A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity
As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?
The post 8 questions to ask yourself before getting a home security camera appeared first on WeLiveSecurity
The attack involved the first recorded abuse of a security vulnerability in a Dell driver that was patched in May 2021
The post ESET research into new attacks by Lazarus – Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers
The post Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium appeared first on WeLiveSecurity
Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online
The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity
Had your Instagram account stolen? Don’t panic – here’s how to get your account back and how to avoid getting hacked (again)
The post What happens with a hacked Instagram account – and how to recover it appeared first on WeLiveSecurity
A major financial services company has learned the hard way about the importance of proper disposal of customers' personal data
The post What to consider before disposing of personal data – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits?
The post 5 tips to help children navigate the internet safely appeared first on WeLiveSecurity
Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?
The post Hey WeLiveSecurity, how does biometric authentication work? appeared first on WeLiveSecurity
Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it’s happened to you, and how to remove a hacker from your device
The post Can your iPhone be hacked? What to know about iOS security appeared first on WeLiveSecurity
The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products
The post Rising to the challenges of secure coding – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Cross-site tracking cookies have a bleak future but can still cause privacy woes to unwary users
The post Third‑party cookies: How they work and how to stop them from tracking you across the web appeared first on WeLiveSecurity
ESET Research first spotted this variant of the SideWalk backdoor in the network of a Hong Kong university in February 2021
The post SparklingGoblin deploys new Linux backdoor – Week in security, special edition appeared first on WeLiveSecurity
ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor
The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity
Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up.
The post Why is my Wi‑Fi slow and how do I make it faster? appeared first on WeLiveSecurity
Worok takes aim at various high-profile organizations that operate in multiple sectors and are located primarily in Asia
The post ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe appeared first on WeLiveSecurity
It pays to do some research before taking a leap into the world of internet-connected toys
The post Toys behaving badly: How parents can protect their family from IoT threats appeared first on WeLiveSecurity
Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol
The post RDP on the radar: An up‑close view of evolving remote access threats appeared first on WeLiveSecurity
Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files
The post Worok: The big picture appeared first on WeLiveSecurity
What if your organization is hit by a cyberattack that is attributed to a nation state? Would your insurance cover the costs of the attack?
The post Will cyber‑insurance pay out? – Week in security with Tony Anscombe appeared first on WeLiveSecurity