We Live Security stories
Botnets are being overshadowed by ransomware - in the media, at least
Botnets not only harm the owners of infected computers, but others too – they can send out spam, distributing a range of scams or even ransomware.
The three types of employees that can cause a data breach
More and more companies are realizing that trusted & trained employees can also pose an enormous threat. We have identified three types of employees.
A short history of the computer password
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
Fingerprint security & biometrics: Three major myths busted
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Young cybercriminals ‘more motivated by peer respect than financial gain’
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Women in cybersecurity: Slowly but surely, change is coming
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
It’s time to finally say goodbye to Windows XP. And Vista. Again.
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.
The economics of cybersecurity for the undecided
It is precisely because of this concept of the cost of doing nothing that we’re able to determine the value of a cybersecurity solution.
Here are the top trends in Android ransomware right now
Android devices are used to store increasing amounts of valuable data, making Android ransomware ever more worthwhile for attackers.
Welivesecurity reports new crypto-ransomware hitting macOS
Crypto-ransomware campaign for Mac targets users with fake patcher applications distributed via BitTorrent sites.
10 reasons why cybercriminals target smartphones
Smartphones aim to heighten convenience, but there is a real feeling that they're becoming a bigger target for cybercriminals. Why?.
DNS attacks: How they try to direct you to fake pages
that there is more than one type of attack that can affect DNS servers—and in this article we will look at the differences between them.
Released Android malware source code used to run a banking botnet
The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks.
Welivesecurity reveals the eight things you should know about spyware
Spyware is widely spread across the web, and is ever present on today’s mobile and desktop devices. You should be security-conscious at all times.
An in-depth look at next-gen security software: Myths and marketing
When next-gen vendors talk about behavioural analysis as their exclusive discovery, they’re at best misinformed.
Entrust your cyber security secrets to a safe pair of hands
Imagine, if you will, that your security is flawless, and not a single other person can access your sensitive accounts or information.
Ransomware: Key insights from infosec experts
Take ransomware. What does it entail? Does it even matter – will it ever actually affect you? It’ll vanish as quickly as it appeared, right? Wrong.
RoT: The all-powerful Ransomware of Things
Infected IoT devices may extort commercial websites by threatening a DDoS attack, or locking IoT devices in order to charge a ransom aka Jackware.
Beware! New WhatsApp scam offering “free internet without Wi-Fi”
WhatsApp keeps on increasing, with deceptive campaigns coming up with with novel ways of luring in victims. Today we will show you a new example.
Why combining technology with standards could combat fraud
Fraud is still on the increase due to the use of new technologies, causing losses to both users and companies. What is being done to avoid this?.
Siemens-branded CCTV webcams require urgent firmware patch
Siemens-branded IP-based CCTV cameras are the latest internet-connected devices to be found vulnerable to hacking attacks.
Organisations 'not doing enough' to prevent data breaches
Up-to-date security systems, usable security, and awareness on how to deal with threats and social engineering are needed.
The odd, 8-year legacy of the Conficker worm
Conficker worm's 8-year scourge: 11m devices hit, crippling UK MoD and more, as costly legacy prevails.