Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?

WeLiveSecurity favicon WeLiveSecurity β€’ over 1 year ago β€’ 1 min read

ESET World 2024: Big on prevention, even bigger on AI

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.

WeLiveSecurity favicon WeLiveSecurity β€’ over 1 year ago β€’ 1 min read

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders

WeLiveSecurity favicon WeLiveSecurity β€’ over 1 year ago β€’ 1 min read

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?

WeLiveSecurity favicon WeLiveSecurity β€’ over 1 year ago β€’ 1 min read

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings

WeLiveSecurity favicon WeLiveSecurity β€’ over 1 year ago β€’ 1 min read

What happens when AI goes rogue (and how to stop it)

As AI gets closer to the ability to cause physical harm and impact the real world, β€œit’s complicated” is no longer a satisfying response

WeLiveSecurity favicon WeLiveSecurity β€’ over 1 year ago β€’ 1 min read

Student Loan Breach Exposes 2.5M Records

2.5 million people were affected, in a breach that could spell more trouble down the line.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Watering Hole Attacks Push ScanBox Keylogger

Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Tentacles of β€˜0ktapus’ Threat Group Victimize 130 Firms

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Ransomware Attacks are on the Rise

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Twitter Whistleblower Complaint: The TL;DR Version

Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Firewall Bug Under Active Attack Triggers CISA Warning

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Fake Reservation Links Prey on Weary Travelers

Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

iPhone Users Urged to Update to Patch 2 Zero-Days

Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Google Patches Chrome’s Fifth Zero-Day of the Year

An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.

Threatpost favicon Threatpost β€’ about 3 years ago β€’ 1 min read

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Hackers phish for data with fake Apple Watch giveaway

Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

FBI investigating apparent ISIS attacks on Western websites

A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

DDoS attack on feminist blog backfires on International Women's Day

An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Lysa Myers: "There are still only a handful of women in the security field"

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Europol shuts down Ramnit botnet used to steal bank details

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Lenovo and Superfish? Don't panic, you may not be affected

Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Jamie Oliver website serves up a side of malware

Jamie Oliver's website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Facebook exploit allowed attackers to remotely delete photos

A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Electronic health records and data abuse: it's about more than medical info

After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Is your valentine for real? Six signs you might be falling for an online dating scam

With Valentine’s Day nearly upon us, millions will be looking for love online. Here's six online dating scams to look out for.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Facebook launches ThreatExchange for companies to share security threats

Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Security terms explained: What does Zero Day mean?

One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read