TechDay New Zealand - Aotearoa's technology news network

We Live Security stories

Story image
Botnets are being overshadowed by ransomware - in the media, at least
Mon, 12th Jun 2017
#
ddos
#
ransomware
#
malware
Botnets not only harm the owners of infected computers, but others too – they can send out spam, distributing a range of scams or even ransomware.
Story image
The three types of employees that can cause a data breach
Mon, 29th May 2017
#
edutech
#
malware
#
breach prevention
More and more companies are realizing that trusted & trained employees can also pose an enormous threat. We have identified three types of employees.
Story image
A short history of the computer password
Mon, 15th May 2017
#
malware
#
cybersecurity
#
passwords
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
Story image
Fingerprint security & biometrics: Three major myths busted
Mon, 8th May 2017
#
malware
#
biometrics
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
Story image
Young cybercriminals ‘more motivated by peer respect than financial gain’
Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
Story image
Women in cybersecurity: Slowly but surely, change is coming
Mon, 24th Apr 2017
#
malware
#
dei
#
cybersecurity
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
Story image
It’s time to finally say goodbye to Windows XP. And Vista. Again.
Mon, 10th Apr 2017
#
microsoft
#
malware
#
cybersecurity
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
Story image
Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play
Wed, 5th Apr 2017
#
smartphones
#
malware
#
martech
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.
Story image
The economics of cybersecurity for the undecided
Mon, 27th Mar 2017
#
ddos
#
malware
#
phishing
It is precisely because of this concept of the cost of doing nothing that we’re able to determine the value of a cybersecurity solution.
Story image
Here are the top trends in Android ransomware right now
Tue, 14th Mar 2017
#
malware
#
ransomware
#
smartphones
Android devices are used to store increasing amounts of valuable data, making Android ransomware ever more worthwhile for attackers.
Story image
Welivesecurity reports new crypto-ransomware hitting macOS
Mon, 13th Mar 2017
#
malware
#
ransomware
#
apple
Crypto-ransomware campaign for Mac targets users with fake patcher applications distributed via BitTorrent sites.
Story image
10 reasons why cybercriminals target smartphones
Mon, 6th Mar 2017
#
malware
#
smartphones
#
technology gifts
Smartphones aim to heighten convenience, but there is a real feeling that they're becoming a bigger target for cybercriminals. Why?.
Story image
DNS attacks: How they try to direct you to fake pages
Thu, 2nd Mar 2017
#
malware
#
cybersecurity
#
dns attacks
that there is more than one type of attack that can affect DNS servers—and in this article we will look at the differences between them.
Story image
Released Android malware source code used to run a banking botnet
Mon, 27th Feb 2017
#
malware
#
smartphones
#
technology gifts
The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks.
Story image
Welivesecurity reveals the eight things you should know about spyware
Tue, 21st Feb 2017
#
malware
#
cybersecurity
#
cios
Spyware is widely spread across the web, and is ever present on today’s mobile and desktop devices. You should be security-conscious at all times.
Story image
An in-depth look at next-gen security software: Myths and marketing
Tue, 14th Feb 2017
#
cybersecurity
#
analyst report
#
cios
When next-gen vendors talk about behavioural analysis as their exclusive discovery, they’re at best misinformed.
Story image
Entrust your cyber security secrets to a safe pair of hands
Fri, 10th Feb 2017
#
malware
#
cybersecurity
#
we live security
Imagine, if you will, that your security is flawless, and not a single other person can access your sensitive accounts or information.
Story image
Ransomware: Key insights from infosec experts
Tue, 7th Feb 2017
#
malware
#
ransomware
#
cybersecurity
Take ransomware. What does it entail? Does it even matter – will it ever actually affect you? It’ll vanish as quickly as it appeared, right? Wrong.
Story image
RoT: The all-powerful Ransomware of Things
Tue, 31st Jan 2017
#
ddos
#
ransomware
#
malware
Infected IoT devices may extort commercial websites by threatening a DDoS attack, or locking IoT devices in order to charge a ransom aka Jackware.
Story image
Beware! New WhatsApp scam offering “free internet without Wi-Fi”
Mon, 16th Jan 2017
#
cloud services
#
email security
#
wireless networks
WhatsApp keeps on increasing, with deceptive campaigns coming up with with novel ways of luring in victims. Today we will show you a new example.
Story image
Why combining technology with standards could combat fraud
Wed, 14th Dec 2016
#
malware
#
cybersecurity
#
fraud
Fraud is still on the increase due to the use of new technologies, causing losses to both users and companies. What is being done to avoid this?.
Story image
Siemens-branded CCTV webcams require urgent firmware patch
Thu, 1st Dec 2016
#
ddos
#
surveillance
#
cios
Siemens-branded IP-based CCTV cameras are the latest internet-connected devices to be found vulnerable to hacking attacks.
Story image
Organisations 'not doing enough' to prevent data breaches
Thu, 1st Dec 2016
#
breach prevention
#
cybersecurity
#
data breach
Up-to-date security systems, usable security, and awareness on how to deal with threats and social engineering are needed.
Story image
The odd, 8-year legacy of the Conficker worm
Tue, 22nd Nov 2016
#
malware
#
microsoft
#
cybersecurity
Conficker worm's 8-year scourge: 11m devices hit, crippling UK MoD and more, as costly legacy prevails.