Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Facebook porn scam infects 110k users in 48 hours

A new porn scam is spreading startlingly quickly through Facebook - one that has managed to spread malware to over 110,000 users in 48 hours, reports The Guardian.

Published on: February 02, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

MSIL/Agent.PYO: Have botnet, will travel

ESET's researchers recently encountered a piece of malware targeting the filling of the forms belonging to the Consulate of Poland. To understand why it is first necessary to have a brief look at the application process for visas.

Published on: January 29, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Taylor Swift hacked, but denies naked pictures will be leaked

Singer Taylor Swift has had her Twitter and Instagram accounts hacked, but laughed off claims that the hackers will release nude photographs of her.

Published on: January 28, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Android Wi-Fi Direct bug means hackers can reboot your device

A vulnerability in Android's Wi-Fi Direct functionality has been uncovered by security researchers.

Published on: January 27, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

6 WhatsApp Security Tips

Even though WhatsApp now encrypts all of its messages and data, it pays to be secure with your chats. Here are our top WhatsApp security tips.

Published on: January 26, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Edward Snowden doesn't use an iPhone for privacy reasons

NSA whistleblower Edward Snowden has claimed he doesn't use an iPhone for fear of surveillance technology in the smartphone, reports The Independent.

Published on: January 23, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Blackhat: Lessons from the Michael Mann, Chris Hemsworth movie?

Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?

Published on: January 23, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Cybercrime deterrence: 6 important steps

Cybercrime: there's too much of it, and we need to do more to deter it. With the President of the United States now making frequent references to "doing more about cybercrime" now is a good time to look at what steps must be taken.

Published on: January 20, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

How can businesses save money on internet security in 2015?

A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.

Published on: January 19, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Lizard Squad DDoS-for-hire service hacked - users' details revealed

Lizard Squad failed to encrypt its database of LizardStresser's registered users - storing details of their usernames and passwords in plaintext. A schoolboy error if ever I heard one.

Published on: January 19, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Swiss bank data released by hackers

The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to pay the ransom demanded by the attackers

Published on: January 14, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Obama to propose legislation that protects firms sharing cyberthreat data

President Barack Obama is planning to push legislation which would protect companies from lawsuits for sharing cyberthreat data with the government, reports the Washington Post.

Published on: January 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Hacked routers used for paid DDoS attacks

The rent-a-DDoS service that knocked out Xbox Live and Playstation Network is powered by thousands of hacked residential internet routers.

Published on: January 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

British Prime Minister wants access to messaging apps

British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies

Published on: January 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Do you really need antivirus software for Linux desktops?

It started, innocently enough, as a question asked in the ESET Security Forum titled "Eset – Do I Really Need Antivirus On My Linux Distros?" However, the answer to that seemingly simple question on Linux antivirus is more complex than a simple yes-or-no response.

Published on: January 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

'Critical Security Updates' cancelled for 939 million Android users

Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software

Published on: January 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Digital Invasion: 3 things we learned from CES 2015

Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.

Published on: January 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook privacy - why statements about copyright don't do anything

Facebook users around the world have reported the return of the network’s longer-lasting hoaxes - a legal disclaimer which allows users to regain copyright over their images and other content. Here's why it doesn't work.

Published on: January 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Windows exploitation in 2014

Today, we published our research about Windows exploitation in 2014. This report contains interesting information about vulnerabilities in Microsoft Windows and Office patched over the course of the year, drive-by download attacks and mitigation techniques.

Published on: January 08, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Phish Allergy – Recognizing Phishing Messages

While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.

Published on: January 08, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

5 reasons not to "hack back"

Are hacking victims "hacking back"? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of "hacking back" when he asked me about revenge hacking.

Published on: January 07, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

AOL blocks malicious ads from its advertising platform

AOL has taken steps to stop a set of malicious advertisements being served through their sites, including The Huffington Post, Computer Business Review reports.

Published on: January 07, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

CES 2015 in Las Vegas: first impressions, 5 hot topics

With nearly 160,000 lust-ridden techies, corporate denizens and a few of us security types descending on a slightly crisp wintery Las Vegas to see what all the fuss is about at CES 2015, here are a few things to keep an eye out for this year at the show.

Published on: January 07, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Bitstamp hacked for $5 million in Bitcoin

19,000 Bitcoin - valued at around $275 each, so $5 million together - have been stolen from a majour European Bitcoin exchange, reports RT.

Published on: January 06, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Unpatched security hole has left millions of Moonpig customers at risk for 17 months

Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.

Published on: January 06, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Hobbit-inspired sword can help you find unsecured WiFi hotspots

Like many others, I was enchanted by The Hobbit (and later Lord of the Rings) at a young age - long before Peter Jackson turned J R R Tolkien's middle-earth fantasy books into a series of blockbuster movies.

Published on: December 29, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Biometrics - can your fingerprint be β€˜copied’ from a normal photo?

Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones - but biometrics may not be as secure as many believe.

Published on: December 29, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Virlock: First Self-Reproducing Ransomware is also a Shape Shifter

Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting piece of malware to analyze. This is the first time such combination of malware features has been observed.

Published on: December 22, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Madonna thinks her computer was hacked

Turns out that the Material Girl has had her material stolen, and she's blaming hackers!

Published on: December 22, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Mobile security: flaw allows hackers to read texts and listen to calls

Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.

Published on: December 19, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

ICANN computers compromised by hackers

The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.

Published on: December 18, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Cybercrime Trends & Predictions for 2015

As regular readers will know, every year we publish our predictions on cybercrime attacks for the year ahead. Well, our South American research team has spent the last few weeks putting together our predictions for 2015.

Published on: December 18, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

TorrentLocker — Ransomware in a country near you

Today, we are publishing research on ransomware that emerged in 2014. We have posted blog articles about this threat before, to raise awareness when we realized the criminals were targeting the United Kingdom and Spain.

Published on: December 16, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

TorrentLocker: Racketeering ransomware disassembled by ESET experts

Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.

Published on: December 16, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Android scam: Firms fined over $500,000 for malicious apps' hidden subscriptions

Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.

Published on: December 11, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity