FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WeLiveSecurity

Don’t let dormant accounts become a doorway for cybercriminals

β€” June 2nd 2025 at 09:00
Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.
☐ β˜† βœ‡ WeLiveSecurity

How safe and secure is your iPhone really?

β€” April 28th 2025 at 09:47
Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
☐ β˜† βœ‡ WeLiveSecurity

Will super-smart AI be attacking us anytime soon?

β€” April 22nd 2025 at 09:00
What practical AI attacks exist today? β€œMore than zero” is the answer – and they’re getting better.
☐ β˜† βœ‡ WeLiveSecurity

Attacks on the education sector are surging: How can cyber-defenders respond?

β€” April 14th 2025 at 09:00
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
☐ β˜† βœ‡ WeLiveSecurity

Watch out for these traps lurking in search results

β€” April 10th 2025 at 09:00
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results
☐ β˜† βœ‡ WeLiveSecurity

So your friend has been hacked: Could you be next?

β€” April 9th 2025 at 09:00
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
☐ β˜† βœ‡ WeLiveSecurity

1 billion reasons to protect your identity online

β€” April 8th 2025 at 09:00
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
☐ β˜† βœ‡ WeLiveSecurity

Resilience in the face of ransomware: A key to business survival

β€” March 31st 2025 at 09:00
Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage
☐ β˜† βœ‡ WeLiveSecurity

Making it stick: How to get the most out of cybersecurity training

β€” March 28th 2025 at 10:00
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill β€˜sticky’ habits that will kick in when a danger is near
☐ β˜† βœ‡ WeLiveSecurity

AI-driven deception: A new face of corporate fraud

β€” March 10th 2025 at 10:00
Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses
β˜‘ β˜† βœ‡ WeLiveSecurity

Operating System Vulnerabilities, Exploits and Insecurity

β€” March 10th 2015 at 13:40
iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
β˜‘ β˜† βœ‡ WeLiveSecurity

FBI investigating apparent ISIS attacks on Western websites

β€” March 9th 2015 at 12:26
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
β˜‘ β˜† βœ‡ WeLiveSecurity

Security terms explained: What does Zero Day mean?

β€” February 11th 2015 at 18:22
One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.
β˜‘ β˜† βœ‡ WeLiveSecurity

Android Wi-Fi Direct bug means hackers can reboot your device

β€” January 27th 2015 at 14:28
A vulnerability in Android's Wi-Fi Direct functionality has been uncovered by security researchers.
β˜‘ β˜† βœ‡ WeLiveSecurity

'Critical Security Updates' cancelled for 939 million Android users

β€” January 12th 2015 at 16:53
Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software
β˜‘ β˜† βœ‡ WeLiveSecurity

ICANN computers compromised by hackers

β€” December 18th 2014 at 17:01
The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.
β˜‘ β˜† βœ‡ WeLiveSecurity

Apple Pay and security - what you need to know

β€” November 7th 2014 at 15:12
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.
☐ β˜† βœ‡ WeLiveSecurity

Patch or perish: How organizations can master vulnerability management

β€” February 5th 2025 at 10:00
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
☐ β˜† βœ‡ WeLiveSecurity

How scammers are exploiting DeepSeek's rise

β€” January 31st 2025 at 13:51
As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek
☐ β˜† βœ‡ WeLiveSecurity

Untrustworthy AI: How to deal with data poisoning

β€” January 30th 2025 at 10:00
You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so
☐ β˜† βœ‡ WeLiveSecurity

The evolving landscape of data privacy: Key trends to shape 2025

β€” January 23rd 2025 at 10:00
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams
☐ β˜† βœ‡ WeLiveSecurity

Under lock and key: Protecting corporate data from cyberthreats in 2025

β€” January 21st 2025 at 10:00
Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage
☐ β˜† βœ‡ WeLiveSecurity

Cybersecurity and AI: What does 2025 have in store?

β€” January 15th 2025 at 10:00
In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats
☐ β˜† βœ‡ WeLiveSecurity

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

β€” January 9th 2025 at 10:00
As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe
☐ β˜† βœ‡ WeLiveSecurity

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

β€” January 7th 2025 at 10:00
The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats
☐ β˜† βœ‡ WeLiveSecurity

AI moves to your PC with its own special hardware

β€” January 6th 2025 at 10:00
Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.
☐ β˜† βœ‡ WeLiveSecurity

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

β€” December 18th 2024 at 10:00
While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company's defenses are ready, no matter the time of year
☐ β˜† βœ‡ WeLiveSecurity

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

β€” December 13th 2024 at 11:16
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems
☐ β˜† βœ‡ WeLiveSecurity

Black Hat Europe 2024: Can AI systems be socially engineered?

β€” December 12th 2024 at 14:07
Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?
☐ β˜† βœ‡ WeLiveSecurity

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

β€” December 9th 2024 at 10:00
Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost
☐ β˜† βœ‡ WeLiveSecurity

Achieving cybersecurity compliance in 5 steps

β€” December 3rd 2024 at 10:00
Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements
☐ β˜† βœ‡ WeLiveSecurity

My information was stolen. Now what?

β€” November 19th 2024 at 10:00
The slow and painful recovery process
☐ β˜† βœ‡ WeLiveSecurity

What’s up with Emotet?

β€” July 6th 2023 at 11:30
A brief summary of what happened with Emotet since its comeback in November 2021
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

β€” June 30th 2023 at 15:15
The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions
☐ β˜† βœ‡ WeLiveSecurity

What to know about the MOVEit hack – Week in security with Tony Anscombe

β€” June 23rd 2023 at 15:30
The US government has now announced a bounty of $10 million for intel linking the Cl0p ransomware gang to a foreign government
☐ β˜† βœ‡ WeLiveSecurity

Digital security for the self-employed: Staying safe without an IT team to help

β€” May 24th 2023 at 11:30
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
☐ β˜† βœ‡ WeLiveSecurity

The danger within: 5 steps you can take to combat insider threats

By: MΓ‘rk SzabΓ³ β€” July 13th 2023 at 09:30

Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?

The post The danger within: 5 steps you can take to combat insider threats appeared first on WeLiveSecurity

❌