We Live Security stories
![Story image](../../../../../uploads/story/2017/06/12/preview_ThinkstockPhotos-653929998.webp)
Botnets are being overshadowed by ransomware - in the media, at least
Mon, 12th Jun 2017
#
ddos
#
ransomware
#
malware
Botnets not only harm the owners of infected computers, but others too – they can send out spam, distributing a range of scams or even ransomware.
![Story image](../../../../../uploads/story/2017/05/29/preview_ThinkstockPhotos-100796392.webp)
The three types of employees that can cause a data breach
Mon, 29th May 2017
#
edutech
#
malware
#
breach prevention
More and more companies are realizing that trusted & trained employees can also pose an enormous threat. We have identified three types of employees.
![Story image](../../../../../uploads/story/2017/05/15/preview_ThinkstockPhotos-671978144.webp)
A short history of the computer password
Mon, 15th May 2017
#
malware
#
cybersecurity
#
passwords
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.
![Story image](../../../../../uploads/story/2017/05/08/preview_ThinkstockPhotos-616890412.webp)
Fingerprint security & biometrics: Three major myths busted
Mon, 8th May 2017
#
biometrics
#
malware
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.
![Story image](../../../../../uploads/story/2017/04/27/preview_ThinkstockPhotos-491324833.webp)
Young cybercriminals ‘more motivated by peer respect than financial gain’
Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.
![Story image](../../../../../uploads/story/2017/04/24/preview_ThinkstockPhotos-642442154.webp)
Women in cybersecurity: Slowly but surely, change is coming
Mon, 24th Apr 2017
#
malware
#
esg
#
cybersecurity
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.
![Story image](../../../../../uploads/story/2017/04/10/preview_ThinkstockPhotos-478338933.webp)
It’s time to finally say goodbye to Windows XP. And Vista. Again.
Mon, 10th Apr 2017
#
malware
#
cybersecurity
#
microsoft
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.
![Story image](../../../../../uploads/story/2017/04/05/preview_ThinkstockPhotos-655596958.webp)
Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play
Wed, 5th Apr 2017
#
smartphones
#
malware
#
martech
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.
![Story image](../../../../../uploads/story/2017/03/27/preview_ThinkstockPhotos-486791090.webp)
The economics of cybersecurity for the undecided
Mon, 27th Mar 2017
#
ddos
#
malware
#
phishing
It is precisely because of this concept of the cost of doing nothing that we’re able to determine the value of a cybersecurity solution.
![Story image](../../../../../uploads/story/2017/03/14/preview_ThinkstockPhotos-623982946.webp)
Here are the top trends in Android ransomware right now
Tue, 14th Mar 2017
#
malware
#
ransomware
#
smartphones
Android devices are used to store increasing amounts of valuable data, making Android ransomware ever more worthwhile for attackers.
![Story image](../../../../../uploads/story/2017/03/13/preview_ThinkstockPhotos-148351349.webp)
Welivesecurity reports new crypto-ransomware hitting macOS
Mon, 13th Mar 2017
#
malware
#
ransomware
#
cybersecurity
Crypto-ransomware campaign for Mac targets users with fake patcher applications distributed via BitTorrent sites.
![Story image](../../../../../uploads/story/2017/03/06/preview_ThinkstockPhotos-646161474.webp)
10 reasons why cybercriminals target smartphones
Mon, 6th Mar 2017
#
malware
#
smartphones
#
cybersecurity
Smartphones aim to heighten convenience, but there is a real feeling that they're becoming a bigger target for cybercriminals. Why?.
![Story image](../../../../../uploads/story/2017/03/02/preview_ThinkstockPhotos-485001492.webp)
DNS attacks: How they try to direct you to fake pages
Thu, 2nd Mar 2017
#
malware
#
cybersecurity
#
dns attacks
that there is more than one type of attack that can affect DNS servers—and in this article we will look at the differences between them.
![Story image](../../../../../uploads/story/2017/02/27/preview_ThinkstockPhotos-115837998.webp)
Released Android malware source code used to run a banking botnet
Mon, 27th Feb 2017
#
malware
#
smartphones
#
cybersecurity
The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks.
![Story image](../../../../../uploads/story/2017/02/21/preview_ThinkstockPhotos-487678304.webp)
Welivesecurity reveals the eight things you should know about spyware
Tue, 21st Feb 2017
#
malware
#
cybersecurity
#
spyware
Spyware is widely spread across the web, and is ever present on today’s mobile and desktop devices. You should be security-conscious at all times.
![Story image](../../../../../uploads/story/2017/02/14/preview_ThinkstockPhotos-498285435.webp)
An in-depth look at next-gen security software: Myths and marketing
Tue, 14th Feb 2017
#
cybersecurity
#
virus
#
analyst report
When next-gen vendors talk about behavioural analysis as their exclusive discovery, they’re at best misinformed.
![Story image](../../../../../uploads/story/2017/02/10/preview_ThinkstockPhotos-531550066.webp)
Entrust your cyber security secrets to a safe pair of hands
Fri, 10th Feb 2017
#
malware
#
cybersecurity
#
we live security
Imagine, if you will, that your security is flawless, and not a single other person can access your sensitive accounts or information.
![Story image](../../../../../uploads/story/2017/02/07/preview_ThinkstockPhotos-200484500-001.webp)
Ransomware: Key insights from infosec experts
Tue, 7th Feb 2017
#
malware
#
ransomware
#
cybersecurity
Take ransomware. What does it entail? Does it even matter – will it ever actually affect you? It’ll vanish as quickly as it appeared, right? Wrong.
![Story image](../../../../../uploads/story/2017/01/31/preview_ThinkstockPhotos-637582754.webp)
RoT: The all-powerful Ransomware of Things
Tue, 31st Jan 2017
#
malware
#
ddos
#
ransomware
Infected IoT devices may extort commercial websites by threatening a DDoS attack, or locking IoT devices in order to charge a ransom aka Jackware.
![Story image](../../../../../uploads/story/2017/01/16/preview_ThinkstockPhotos-493694506.webp)
Beware! New WhatsApp scam offering “free internet without Wi-Fi”
Mon, 16th Jan 2017
#
email security
#
wireless networks
#
cybersecurity
WhatsApp keeps on increasing, with deceptive campaigns coming up with with novel ways of luring in victims. Today we will show you a new example.