FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
β˜‘ β˜† βœ‡ WeLiveSecurity

Lenovo and Superfish? Don't panic, you may not be affected

β€” February 20th 2015 at 19:45
Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.
β˜‘ β˜† βœ‡ WeLiveSecurity

The New Hacker's List and an Old Debate: Would you Hire a Hacker?

β€” February 3rd 2015 at 14:03
The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?
β˜‘ β˜† βœ‡ WeLiveSecurity

Taylor Swift hacked, but denies naked pictures will be leaked

β€” January 28th 2015 at 13:54
Singer Taylor Swift has had her Twitter and Instagram accounts hacked, but laughed off claims that the hackers will release nude photographs of her.
β˜‘ β˜† βœ‡ WeLiveSecurity

Cybercrime deterrence: 6 important steps

β€” January 20th 2015 at 02:50
Cybercrime: there's too much of it, and we need to do more to deter it. With the President of the United States now making frequent references to "doing more about cybercrime" now is a good time to look at what steps must be taken.
β˜‘ β˜† βœ‡ WeLiveSecurity

Swiss bank data released by hackers

β€” January 14th 2015 at 14:14
The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to pay the ransom demanded by the attackers
β˜‘ β˜† βœ‡ WeLiveSecurity

British Prime Minister wants access to messaging apps

β€” January 13th 2015 at 14:10
British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies
β˜‘ β˜† βœ‡ WeLiveSecurity

Digital Invasion: 3 things we learned from CES 2015

β€” January 9th 2015 at 12:47
Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.
β˜‘ β˜† βœ‡ WeLiveSecurity

Phish Allergy – Recognizing Phishing Messages

β€” January 8th 2015 at 10:21
While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.
β˜‘ β˜† βœ‡ WeLiveSecurity

5 reasons not to "hack back"

β€” January 7th 2015 at 17:27
Are hacking victims "hacking back"? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of "hacking back" when he asked me about revenge hacking.
β˜‘ β˜† βœ‡ WeLiveSecurity

CES 2015 in Las Vegas: first impressions, 5 hot topics

β€” January 7th 2015 at 10:21
With nearly 160,000 lust-ridden techies, corporate denizens and a few of us security types descending on a slightly crisp wintery Las Vegas to see what all the fuss is about at CES 2015, here are a few things to keep an eye out for this year at the show.
β˜‘ β˜† βœ‡ WeLiveSecurity

Biometrics - can your fingerprint be β€˜copied’ from a normal photo?

β€” December 29th 2014 at 10:03
Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones - but biometrics may not be as secure as many believe.
β˜‘ β˜† βœ‡ WeLiveSecurity

Madonna thinks her computer was hacked

β€” December 22nd 2014 at 10:00
Turns out that the Material Girl has had her material stolen, and she's blaming hackers!
β˜‘ β˜† βœ‡ WeLiveSecurity

Identity theft - six tips to help keep yours safe

β€” December 8th 2014 at 13:47
Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves - if not more so. Lock yours down with our tips.
β˜‘ β˜† βœ‡ WeLiveSecurity

Cyber Monday - 12 tips to help you shop safely online

β€” November 27th 2014 at 13:25
Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.
β˜‘ β˜† βœ‡ WeLiveSecurity

Privacy and security post-Snowden: Pew Research parallels ESET findings

β€” November 17th 2014 at 17:42
Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring similar results from two different privacy and security surveys conducted by ESET.
β˜‘ β˜† βœ‡ WeLiveSecurity

How to make sure Adobe Flash is up-to-date and enabling it on-demand

β€” October 31st 2014 at 15:51
Learn how to update Adobe Flash Player, to help protect against malware attacks.
β˜‘ β˜† βœ‡ WeLiveSecurity

Botnet malware: What it is and how to fight it

β€” October 22nd 2014 at 09:21
Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
β˜‘ β˜† βœ‡ WeLiveSecurity

Botnets: remote controls for cybercriminals

β€” October 20th 2014 at 08:55
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
β˜‘ β˜† βœ‡ WeLiveSecurity

October is the Cyber Security Month: stats, events and advice

β€” October 15th 2014 at 14:21
Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.
☐ β˜† βœ‡ WeLiveSecurity

Hear no evil: Ultrasound attacks on voice assistants

β€” June 7th 2023 at 11:30
HowΒ your voice assistant could do the bidding of a hacker – without you ever hearing a thing
❌