Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

WireLurker: new malware targets Apple users

A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

Facebook welcomes private browsers with dedicated Tor link

Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

How to make sure Adobe Flash is up-to-date and enabling it on-demand

Learn how to update Adobe Flash Player, to help protect against malware attacks.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

Top 5 Scariest Zombie Botnets

An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

The Evolution of Webinject

Last month, we presented β€œThe Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

Botnet malware: What it is and how to fight it

Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Myths about malware: an exploit is the same as malware

In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Botnets: remote controls for cybercriminals

As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Privacy online - what you can do (and what you can’t)

Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Facebook 'Safety Check' allows travelers to alert family

Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

October is the Cyber Security Month: stats, events and advice

Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Ello privacy - what you need to know

For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation - we offer a few tips on how to get the most from the emoji-heavy network here.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

4Chan: destructive hoaxes and the Internet of Not Things

The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that's evolved into a sophisticated threat with a modular architecture.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read