Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability

Published on: May 31, 2024 | Source: WeLiveSecurity favicon WeLiveSecurity

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?

Published on: May 30, 2024 | Source: WeLiveSecurity favicon WeLiveSecurity

ESET World 2024: Big on prevention, even bigger on AI

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.

Published on: May 29, 2024 | Source: WeLiveSecurity favicon WeLiveSecurity

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders

Published on: May 28, 2024 | Source: WeLiveSecurity favicon WeLiveSecurity

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?

Published on: May 24, 2024 | Source: WeLiveSecurity favicon WeLiveSecurity

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings

Published on: May 23, 2024 | Source: WeLiveSecurity favicon WeLiveSecurity

What happens when AI goes rogue (and how to stop it)

As AI gets closer to the ability to cause physical harm and impact the real world, β€œit’s complicated” is no longer a satisfying response

Published on: May 22, 2024 | Source: WeLiveSecurity favicon WeLiveSecurity

Student Loan Breach Exposes 2.5M Records

2.5 million people were affected, in a breach that could spell more trouble down the line.

Published on: August 31, 2022 | Source: Threatpost favicon Threatpost

Watering Hole Attacks Push ScanBox Keylogger

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

Published on: August 30, 2022 | Source: Threatpost favicon Threatpost

Tentacles of β€˜0ktapus’ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

Published on: August 29, 2022 | Source: Threatpost favicon Threatpost

Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

Published on: August 26, 2022 | Source: Threatpost favicon Threatpost

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.

Published on: August 25, 2022 | Source: Threatpost favicon Threatpost

Twitter Whistleblower Complaint: The TL;DR Version

Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.

Published on: August 24, 2022 | Source: Threatpost favicon Threatpost

Firewall Bug Under Active Attack Triggers CISA Warning

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

Published on: August 23, 2022 | Source: Threatpost favicon Threatpost

Fake Reservation Links Prey on Weary Travelers

Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.

Published on: August 22, 2022 | Source: Threatpost favicon Threatpost

iPhone Users Urged to Update to Patch 2 Zero-Days

Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.

Published on: August 19, 2022 | Source: Threatpost favicon Threatpost

Google Patches Chrome’s Fifth Zero-Day of the Year

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

Published on: August 18, 2022 | Source: Threatpost favicon Threatpost

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

Published on: March 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Hackers phish for data with fake Apple Watch giveaway

Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.

Published on: March 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.

Published on: March 10, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Published on: March 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

FBI investigating apparent ISIS attacks on Western websites

A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.

Published on: March 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

DDoS attack on feminist blog backfires on International Women's Day

An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.

Published on: March 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Lysa Myers: "There are still only a handful of women in the security field"

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.

Published on: March 06, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

Published on: March 05, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

Published on: March 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

Published on: March 02, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Europol shuts down Ramnit botnet used to steal bank details

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

Published on: February 26, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Lenovo and Superfish? Don't panic, you may not be affected

Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

Published on: February 20, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Jamie Oliver website serves up a side of malware

Jamie Oliver's website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.

Published on: February 19, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook exploit allowed attackers to remotely delete photos

A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.

Published on: February 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Electronic health records and data abuse: it's about more than medical info

After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.

Published on: February 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Is your valentine for real? Six signs you might be falling for an online dating scam

With Valentine’s Day nearly upon us, millions will be looking for love online. Here's six online dating scams to look out for.

Published on: February 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook launches ThreatExchange for companies to share security threats

Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.

Published on: February 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Security terms explained: What does Zero Day mean?

One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.

Published on: February 11, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity