FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
β˜‘ β˜† βœ‡ WeLiveSecurity

Operating System Vulnerabilities, Exploits and Insecurity

β€” March 10th 2015 at 13:40
iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
β˜‘ β˜† βœ‡ WeLiveSecurity

FBI investigating apparent ISIS attacks on Western websites

β€” March 9th 2015 at 12:26
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
β˜‘ β˜† βœ‡ WeLiveSecurity

DDoS attack on feminist blog backfires on International Women's Day

β€” March 9th 2015 at 11:04
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
β˜‘ β˜† βœ‡ WeLiveSecurity

Europol shuts down Ramnit botnet used to steal bank details

β€” February 26th 2015 at 12:37
The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.
β˜‘ β˜† βœ‡ WeLiveSecurity

Lenovo and Superfish? Don't panic, you may not be affected

β€” February 20th 2015 at 19:45
Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook exploit allowed attackers to remotely delete photos

β€” February 13th 2015 at 14:05
A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.
β˜‘ β˜† βœ‡ WeLiveSecurity

Electronic health records and data abuse: it's about more than medical info

β€” February 13th 2015 at 13:01
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook launches ThreatExchange for companies to share security threats

β€” February 12th 2015 at 12:17
Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.
β˜‘ β˜† βœ‡ WeLiveSecurity

Security terms explained: What does Zero Day mean?

β€” February 11th 2015 at 18:22
One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.
β˜‘ β˜† βœ‡ WeLiveSecurity

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

β€” February 10th 2015 at 14:00
WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook turns 11 - what you need to know, and what do your likes say about you?

β€” February 4th 2015 at 10:30
Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about the new settings and how they could affect you.
β˜‘ β˜† βœ‡ WeLiveSecurity

White House seeks 10% increase in cybersecurity spend

β€” February 3rd 2015 at 17:28
President Obama's budget proposal for the 2016 fiscal year includes a projected 10 percent increase in cybersecurity spend, reports Reuters.
β˜‘ β˜† βœ‡ WeLiveSecurity

The New Hacker's List and an Old Debate: Would you Hire a Hacker?

β€” February 3rd 2015 at 14:03
The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook porn scam infects 110k users in 48 hours

β€” February 2nd 2015 at 12:42
A new porn scam is spreading startlingly quickly through Facebook - one that has managed to spread malware to over 110,000 users in 48 hours, reports The Guardian.
β˜‘ β˜† βœ‡ WeLiveSecurity

Taylor Swift hacked, but denies naked pictures will be leaked

β€” January 28th 2015 at 13:54
Singer Taylor Swift has had her Twitter and Instagram accounts hacked, but laughed off claims that the hackers will release nude photographs of her.
β˜‘ β˜† βœ‡ WeLiveSecurity

Android Wi-Fi Direct bug means hackers can reboot your device

β€” January 27th 2015 at 14:28
A vulnerability in Android's Wi-Fi Direct functionality has been uncovered by security researchers.
β˜‘ β˜† βœ‡ WeLiveSecurity

Edward Snowden doesn't use an iPhone for privacy reasons

β€” January 23rd 2015 at 14:18
NSA whistleblower Edward Snowden has claimed he doesn't use an iPhone for fear of surveillance technology in the smartphone, reports The Independent.
β˜‘ β˜† βœ‡ WeLiveSecurity

Blackhat: Lessons from the Michael Mann, Chris Hemsworth movie?

β€” January 23rd 2015 at 13:26
Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook will highlight hoaxes in users' newsfeeds

β€” January 21st 2015 at 12:11
Facebook has announced plans to crack down on spam and hoaxes in the newsfeed, with a note highlighting 'false information' when enough people flag the link as a hoax.
β˜‘ β˜† βœ‡ WeLiveSecurity

Cybercrime deterrence: 6 important steps

β€” January 20th 2015 at 02:50
Cybercrime: there's too much of it, and we need to do more to deter it. With the President of the United States now making frequent references to "doing more about cybercrime" now is a good time to look at what steps must be taken.
β˜‘ β˜† βœ‡ WeLiveSecurity

Lizard Squad DDoS-for-hire service hacked - users' details revealed

β€” January 19th 2015 at 00:29
Lizard Squad failed to encrypt its database of LizardStresser's registered users - storing details of their usernames and passwords in plaintext. A schoolboy error if ever I heard one.
β˜‘ β˜† βœ‡ WeLiveSecurity

Swiss bank data released by hackers

β€” January 14th 2015 at 14:14
The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to pay the ransom demanded by the attackers
β˜‘ β˜† βœ‡ WeLiveSecurity

Hacked routers used for paid DDoS attacks

β€” January 13th 2015 at 15:09
The rent-a-DDoS service that knocked out Xbox Live and Playstation Network is powered by thousands of hacked residential internet routers.
β˜‘ β˜† βœ‡ WeLiveSecurity

British Prime Minister wants access to messaging apps

β€” January 13th 2015 at 14:10
British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies
β˜‘ β˜† βœ‡ WeLiveSecurity

'Critical Security Updates' cancelled for 939 million Android users

β€” January 12th 2015 at 16:53
Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software
β˜‘ β˜† βœ‡ WeLiveSecurity

Digital Invasion: 3 things we learned from CES 2015

β€” January 9th 2015 at 12:47
Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook privacy - why statements about copyright don't do anything

β€” January 9th 2015 at 11:24
Facebook users around the world have reported the return of the network’s longer-lasting hoaxes - a legal disclaimer which allows users to regain copyright over their images and other content. Here's why it doesn't work.
β˜‘ β˜† βœ‡ WeLiveSecurity

Phish Allergy – Recognizing Phishing Messages

β€” January 8th 2015 at 10:21
While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.
β˜‘ β˜† βœ‡ WeLiveSecurity

5 reasons not to "hack back"

β€” January 7th 2015 at 17:27
Are hacking victims "hacking back"? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of "hacking back" when he asked me about revenge hacking.
β˜‘ β˜† βœ‡ WeLiveSecurity

CES 2015 in Las Vegas: first impressions, 5 hot topics

β€” January 7th 2015 at 10:21
With nearly 160,000 lust-ridden techies, corporate denizens and a few of us security types descending on a slightly crisp wintery Las Vegas to see what all the fuss is about at CES 2015, here are a few things to keep an eye out for this year at the show.
β˜‘ β˜† βœ‡ WeLiveSecurity

Bitstamp hacked for $5 million in Bitcoin

β€” January 6th 2015 at 15:29
19,000 Bitcoin - valued at around $275 each, so $5 million together - have been stolen from a majour European Bitcoin exchange, reports RT.
β˜‘ β˜† βœ‡ WeLiveSecurity

Unpatched security hole has left millions of Moonpig customers at risk for 17 months

β€” January 6th 2015 at 08:54
Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.
β˜‘ β˜† βœ‡ WeLiveSecurity

Hobbit-inspired sword can help you find unsecured WiFi hotspots

β€” December 29th 2014 at 23:27
Like many others, I was enchanted by The Hobbit (and later Lord of the Rings) at a young age - long before Peter Jackson turned J R R Tolkien's middle-earth fantasy books into a series of blockbuster movies.
β˜‘ β˜† βœ‡ WeLiveSecurity

Biometrics - can your fingerprint be β€˜copied’ from a normal photo?

β€” December 29th 2014 at 10:03
Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones - but biometrics may not be as secure as many believe.
β˜‘ β˜† βœ‡ WeLiveSecurity

North Korea falls off the internet - is the United States to blame?

β€” December 22nd 2014 at 22:22
Barack Obama promises that the United States will respond to the Sony hack, and North Korea drops off the internet. Is there a connection?
β˜‘ β˜† βœ‡ WeLiveSecurity

Madonna thinks her computer was hacked

β€” December 22nd 2014 at 10:00
Turns out that the Material Girl has had her material stolen, and she's blaming hackers!
β˜‘ β˜† βœ‡ WeLiveSecurity

Mobile security: flaw allows hackers to read texts and listen to calls

β€” December 19th 2014 at 13:45
Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.
β˜‘ β˜† βœ‡ WeLiveSecurity

ICANN computers compromised by hackers

β€” December 18th 2014 at 17:01
The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.
β˜‘ β˜† βœ‡ WeLiveSecurity

TorrentLocker: Racketeering ransomware disassembled by ESET experts

β€” December 16th 2014 at 13:32
Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.
β˜‘ β˜† βœ‡ WeLiveSecurity

Identity theft - six tips to help keep yours safe

β€” December 8th 2014 at 13:47
Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves - if not more so. Lock yours down with our tips.
β˜‘ β˜† βœ‡ WeLiveSecurity

Cyber Monday - 12 tips to help you shop safely online

β€” November 27th 2014 at 13:25
Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.
β˜‘ β˜† βœ‡ WeLiveSecurity

Can e-cigarettes give you malware?

β€” November 22nd 2014 at 15:33
The long-term health effects of electronic cigarettes - or E-cigarettes - are still open for discussion - but the devices could harm your computer, at least if one report is to be believed.
β˜‘ β˜† βœ‡ WeLiveSecurity

Privacy and security post-Snowden: Pew Research parallels ESET findings

β€” November 17th 2014 at 17:42
Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring similar results from two different privacy and security surveys conducted by ESET.
β˜‘ β˜† βœ‡ WeLiveSecurity

IT Pros also guilty of risquΓ© selfies on mobiles

β€” November 14th 2014 at 09:30
ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them embarrassed if lost.
β˜‘ β˜† βœ‡ WeLiveSecurity

Apple Pay and security - what you need to know

β€” November 7th 2014 at 15:12
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook welcomes private browsers with dedicated Tor link

β€” October 31st 2014 at 17:45
Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.
β˜‘ β˜† βœ‡ WeLiveSecurity

How to make sure Adobe Flash is up-to-date and enabling it on-demand

β€” October 31st 2014 at 15:51
Learn how to update Adobe Flash Player, to help protect against malware attacks.
β˜‘ β˜† βœ‡ WeLiveSecurity

Botnet malware: What it is and how to fight it

β€” October 22nd 2014 at 09:21
Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
β˜‘ β˜† βœ‡ WeLiveSecurity

Botnets: remote controls for cybercriminals

β€” October 20th 2014 at 08:55
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
β˜‘ β˜† βœ‡ WeLiveSecurity

Privacy online - what you can do (and what you can’t)

β€” October 17th 2014 at 10:12
Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook 'Safety Check' allows travelers to alert family

β€” October 16th 2014 at 16:44
Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.
β˜‘ β˜† βœ‡ WeLiveSecurity

October is the Cyber Security Month: stats, events and advice

β€” October 15th 2014 at 14:21
Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.
☐ β˜† βœ‡ WeLiveSecurity

Emotet: sold or on vacation? – Week in security with Tony Anscombe

β€” July 7th 2023 at 13:00
Originally a banking trojan, Emotet later evolved into a full-blown botnet and went on to become one of the most dangerous cyberthreats worldwide
☐ β˜† βœ‡ WeLiveSecurity

What’s up with Emotet?

β€” July 6th 2023 at 11:30
A brief summary of what happened with Emotet since its comeback in November 2021
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

β€” June 30th 2023 at 15:15
The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions
☐ β˜† βœ‡ WeLiveSecurity

School’s out for summer, but it’s not time to let your cyber guard down

β€” June 27th 2023 at 11:30
The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits
☐ β˜† βœ‡ WeLiveSecurity

What to know about the MOVEit hack – Week in security with Tony Anscombe

β€” June 23rd 2023 at 15:30
The US government has now announced a bounty of $10 million for intel linking the Cl0p ransomware gang to a foreign government
☐ β˜† βœ‡ WeLiveSecurity

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

β€” June 9th 2023 at 14:30
A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities
☐ β˜† βœ‡ WeLiveSecurity

Hear no evil: Ultrasound attacks on voice assistants

β€” June 7th 2023 at 11:30
HowΒ your voice assistant could do the bidding of a hacker – without you ever hearing a thing
☐ β˜† βœ‡ WeLiveSecurity

All eyes on APIs: Top 3 API security risks and how to mitigate them

β€” June 1st 2023 at 11:30
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency
❌