Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Watering Hole Attacks Push ScanBox Keylogger

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

Published on: August 30, 2022 | Source: Threatpost favicon Threatpost

Tentacles of β€˜0ktapus’ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

Published on: August 29, 2022 | Source: Threatpost favicon Threatpost

Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

Published on: August 26, 2022 | Source: Threatpost favicon Threatpost

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.

Published on: August 25, 2022 | Source: Threatpost favicon Threatpost

Twitter Whistleblower Complaint: The TL;DR Version

Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.

Published on: August 24, 2022 | Source: Threatpost favicon Threatpost

Firewall Bug Under Active Attack Triggers CISA Warning

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

Published on: August 23, 2022 | Source: Threatpost favicon Threatpost

Fake Reservation Links Prey on Weary Travelers

Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.

Published on: August 22, 2022 | Source: Threatpost favicon Threatpost

iPhone Users Urged to Update to Patch 2 Zero-Days

Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.

Published on: August 19, 2022 | Source: Threatpost favicon Threatpost

Google Patches Chrome’s Fifth Zero-Day of the Year

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

Published on: August 18, 2022 | Source: Threatpost favicon Threatpost

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

Published on: March 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Hackers phish for data with fake Apple Watch giveaway

Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.

Published on: March 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.

Published on: March 10, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Published on: March 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

FBI investigating apparent ISIS attacks on Western websites

A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.

Published on: March 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

DDoS attack on feminist blog backfires on International Women's Day

An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.

Published on: March 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Lysa Myers: "There are still only a handful of women in the security field"

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.

Published on: March 06, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

Published on: March 05, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

Published on: March 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

Published on: March 02, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Europol shuts down Ramnit botnet used to steal bank details

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

Published on: February 26, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Lenovo and Superfish? Don't panic, you may not be affected

Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

Published on: February 20, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Jamie Oliver website serves up a side of malware

Jamie Oliver's website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.

Published on: February 19, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook exploit allowed attackers to remotely delete photos

A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.

Published on: February 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Electronic health records and data abuse: it's about more than medical info

After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.

Published on: February 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Is your valentine for real? Six signs you might be falling for an online dating scam

With Valentine’s Day nearly upon us, millions will be looking for love online. Here's six online dating scams to look out for.

Published on: February 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook launches ThreatExchange for companies to share security threats

Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.

Published on: February 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Security terms explained: What does Zero Day mean?

One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.

Published on: February 11, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.

Published on: February 10, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Common eBay scams and how to avoid them

Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most common eBay scams and how they can be avoided.

Published on: February 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

What are the alternatives to passwords?

Is it time for big companies - at the very least - to abandon weak password security? If so, what password alternatives are there?

Published on: February 05, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

The utterly crazy story of the death threat hacker (involves a cat)

A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.

Published on: February 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Internet Explorer exploit could let phishers steal logins

A vulnerability in the latest patched version of Microsoft Internet Explorer that could allow hackers to launch "highly credible phishing attacks" has been uncovered, according to PC World.

Published on: February 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook turns 11 - what you need to know, and what do your likes say about you?

Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about the new settings and how they could affect you.

Published on: February 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

White House seeks 10% increase in cybersecurity spend

President Obama's budget proposal for the 2016 fiscal year includes a projected 10 percent increase in cybersecurity spend, reports Reuters.

Published on: February 03, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

The New Hacker's List and an Old Debate: Would you Hire a Hacker?

The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?

Published on: February 03, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity