FreshRSS

🔒
❌ À propos de FreshRSS
Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
☐ ☆ ✇ WeLiveSecurity

Costco 40th anniversary scam targets WhatsApp users

Par : Miguel Ángel Mendoza

If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is

The post Costco 40th anniversary scam targets WhatsApp users appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Do back offices mean backdoors?

Par : James Shepperd

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture

The post Do back offices mean backdoors? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 ways cybercriminals steal credit card details

Par : Phil Muncaster

Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe

The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Instagram’s new age verification tool – Week in security with Tony Anscombe

Par : Editor

As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?

The post Instagram’s new age verification tool – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Virtual private networks: 5 common questions about VPNs answered

Par : André Lameiras

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask

The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Phishing awareness training: Help your employees avoid the hook

Par : Phil Muncaster

Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders

The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Crypto mixers: What are they and how are they used?

Par : Sol González

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How to spot malicious spam – Week in security with Tony Anscombe

Par : Editor

As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam

The post How to spot malicious spam – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Par : Rene Holt

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

The post How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Industroyer: A cyber‑weapon that brought down a power grid

Par : André Lameiras

Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids

The post Industroyer: A cyber‑weapon that brought down a power grid appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

Par : Editor

Here are three themes that stood out at the world's largest gathering of cybersecurity professionals

The post 3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – APIs, your organization’s dedicated backdoors

Par : Cameron Camp

API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly

The post RSA – APIs, your organization’s dedicated backdoors appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – Creepy real‑world edition

Par : Cameron Camp

Digital fiddling somehow got mixed up in a real war

The post RSA – Creepy real‑world edition appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – Digital healthcare meets security, but does it really want to?

Par : Cameron Camp

Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission

The post RSA – Digital healthcare meets security, but does it really want to? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA – Spot the real fake

Par : Cameron Camp

How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer

The post RSA – Spot the real fake appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cybersecurity awareness training: What is it and what works best?

Par : Phil Muncaster

Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk

The post Cybersecurity awareness training: What is it and what works best? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe

Par : Editor

A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses

The post Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

100 days of war in Ukraine: How the conflict is playing out in cyberspace

Par : André Lameiras

It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict

The post 100 days of war in Ukraine: How the conflict is playing out in cyberspace appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Threat Report T 1 2022

Par : Roman Kovac

A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

The post ESET Threat Report T 1 2022 appeared first on WeLiveSecurity

❌