FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WeLiveSecurity

Don’t let dormant accounts become a doorway for cybercriminals

β€” June 2nd 2025 at 09:00
Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.
☐ β˜† βœ‡ WeLiveSecurity

Will super-smart AI be attacking us anytime soon?

β€” April 22nd 2025 at 09:00
What practical AI attacks exist today? β€œMore than zero” is the answer – and they’re getting better.
☐ β˜† βœ‡ WeLiveSecurity

Watch out for these traps lurking in search results

β€” April 10th 2025 at 09:00
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results
☐ β˜† βœ‡ WeLiveSecurity

So your friend has been hacked: Could you be next?

β€” April 9th 2025 at 09:00
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
☐ β˜† βœ‡ WeLiveSecurity

1 billion reasons to protect your identity online

β€” April 8th 2025 at 09:00
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
β˜‘ β˜† βœ‡ WeLiveSecurity

Operating System Vulnerabilities, Exploits and Insecurity

β€” March 10th 2015 at 13:40
iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
β˜‘ β˜† βœ‡ WeLiveSecurity

FBI investigating apparent ISIS attacks on Western websites

β€” March 9th 2015 at 12:26
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
β˜‘ β˜† βœ‡ WeLiveSecurity

Security terms explained: What does Zero Day mean?

β€” February 11th 2015 at 18:22
One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.
β˜‘ β˜† βœ‡ WeLiveSecurity

ICANN computers compromised by hackers

β€” December 18th 2014 at 17:01
The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.
☐ β˜† βœ‡ WeLiveSecurity

How scammers are exploiting DeepSeek's rise

β€” January 31st 2025 at 13:51
As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek
☐ β˜† βœ‡ WeLiveSecurity

Cybersecurity and AI: What does 2025 have in store?

β€” January 15th 2025 at 10:00
In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats
☐ β˜† βœ‡ WeLiveSecurity

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

β€” January 9th 2025 at 10:00
As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe
☐ β˜† βœ‡ WeLiveSecurity

AI moves to your PC with its own special hardware

β€” January 6th 2025 at 10:00
Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.
☐ β˜† βœ‡ WeLiveSecurity

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

β€” December 13th 2024 at 11:16
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems
☐ β˜† βœ‡ WeLiveSecurity

Black Hat Europe 2024: Can AI systems be socially engineered?

β€” December 12th 2024 at 14:07
Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?
☐ β˜† βœ‡ WeLiveSecurity

My information was stolen. Now what?

β€” November 19th 2024 at 10:00
The slow and painful recovery process
☐ β˜† βœ‡ WeLiveSecurity

What’s up with Emotet?

β€” July 6th 2023 at 11:30
A brief summary of what happened with Emotet since its comeback in November 2021
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

β€” June 30th 2023 at 15:15
The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions
☐ β˜† βœ‡ WeLiveSecurity

What to know about the MOVEit hack – Week in security with Tony Anscombe

β€” June 23rd 2023 at 15:30
The US government has now announced a bounty of $10 million for intel linking the Cl0p ransomware gang to a foreign government
☐ β˜† βœ‡ WeLiveSecurity

Digital security for the self-employed: Staying safe without an IT team to help

β€” May 24th 2023 at 11:30
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
☐ β˜† βœ‡ WeLiveSecurity

The danger within: 5 steps you can take to combat insider threats

By: MΓ‘rk SzabΓ³ β€” July 13th 2023 at 09:30

Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?

The post The danger within: 5 steps you can take to combat insider threats appeared first on WeLiveSecurity

❌