Numando: Count once, code twice

Numando: Count once, code twice

The (probably) penultimate post in our occasional series demystifying Latin American banking trojans. The post Numando: Count once, code twice appeared first on WeLiveSecurity

WhatsApp announces end‑to‑end encrypted backups

WhatsApp announces end‑to‑end encrypted backups

The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks. The post WhatsApp announces end‑to‑end encrypted backups appeared first on WeLiveSecurity

What is a cyberattack surface and how can you reduce it?

What is a cyberattack surface and how can you reduce it?

Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity. The post What is a cyberattack surface and how can you reduce it? appeared first on WeLiveSecurity

Beware of these 5 common scams you can encounter on Instagram

Beware of these 5 common scams you can encounter on Instagram

From cybercriminal evergreens like phishing to the verification badge scam, we look at the most common tactics fraudsters use to trick their victims The post Beware of these 5 common scams you can encounter on Instagram appeared first on WeLiveSecurity

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Cyberespionnage against Kurdish ethnic group, and more! – Week in security with Tony Anscombe The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

BladeHawk group: Android espionage against Kurdish ethnic group

BladeHawk group: Android espionage against Kurdish ethnic group

ESET researchers have investigated a mobile espionage campaign that targets the Kurdish ethnic group and has been active since at least March 2020 The post BladeHawk group: Android espionage against Kurdish ethnic group appeared first on WeLiveSecurity

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Vaccination passports - what you need to know. A guide to kids' smartphone security. CISA lists single-factor authentication as bad practice. The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

A parent’s guide to smartphone security

A parent’s guide to smartphone security

Smartphones are kids’ trusty companions both in- and outside the classroom, and as they return to their desks, we’ve prepared some handy tips on how to keep their devices secure. The post A parent’s guide to smartphone security appeared first on WeLiveSecurity

Flaw in the Quebec vaccine passport: analysis

Flaw in the Quebec vaccine passport: analysis

ESET cybersecurity expert Marc-Étienne Léveillé analyses in-depth the Quebec vaccine proof apps VaxiCode and VaxiCode Verif. The post Flaw in the Quebec vaccine passport: analysis appeared first on WeLiveSecurity

Don’t use single‑factor authentication, warns CISA

Don’t use single‑factor authentication, warns CISA

The federal agency urges organizations to ditch the bad practice and instead use multi-factor authentication methods The post Don’t use single‑factor authentication, warns CISA appeared first on WeLiveSecurity

Vaccine passports: Is your personal data in safe hands?

Vaccine passports: Is your personal data in safe hands?

Vaccination passports may facilitate the return to normalcy, but there are also concerns about what kinds of personal data they collect and how well they protect it. Here’s what you should know. The post Vaccine passports: Is your personal data in safe hands? appeared first on WeLiveSecurity

Week in security with Tony Anscombe

Week in security with Tony Anscombe

ESET research discovers SideWalk backdoor – Why data breach costs have never been higher – 620,000 personal pictures stolen from iCloud accounts The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

Beyond the pandemic: Why are data breach costs at an all‑time high?

Beyond the pandemic: Why are data breach costs at an all‑time high?

It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges. The post Beyond the pandemic: Why are data breach costs at an all‑time high? appeared first on WeLiveSecurity

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Who is actually paying the ransom demand? – Be careful about what you throw away – Records from a terrorist watchlist exposed online The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

Dumpster diving is a filthy business

Dumpster diving is a filthy business

One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin The post Dumpster diving is a filthy business appeared first on WeLiveSecurity

Week in security with Tony Anscombe

Week in security with Tony Anscombe

How IISpy spies on its victims and stays under the radar – IISerpent tampers with search engine results – How to avoid falling prey to ransomware The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

Examining threats to device security in the hybrid workplace

Examining threats to device security in the hybrid workplace

As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands The post Examining threats to device security in the hybrid workplace appeared first on WeLiveSecurity

IISerpent: Malware‑driven SEO fraud as a service

IISerpent: Malware‑driven SEO fraud as a service

The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites The post IISerpent: Malware‑driven SEO fraud as a service appeared first on WeLiveSecurity

Deepfakes – the bot made me do it

Deepfakes – the bot made me do it

As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud? The post Deepfakes – the bot made me do it appeared first on WeLiveSecurity

Ransomware runs rampant, so how can you combat this threat?

Ransomware runs rampant, so how can you combat this threat?

A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim The post Ransomware runs rampant, so how can you combat this threat? appeared first on WeLiveSecurity

DEF CON 29: Satellite hacking 101

DEF CON 29: Satellite hacking 101

How poking at the innards of satellites can make the future of cybersecurity in space more palatable The post DEF CON 29: Satellite hacking 101 appeared first on WeLiveSecurity