StrongPity's backdoor is fitted with various spying features and can record phone calls, collect texts, and gather call logs and contact lists
The post APT group trojanizes Telegram app – Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA
The post Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit appeared first on WeLiveSecurity
A new law portends a future where (we hope) it will be easier for us all to repair, fix, upgrade, and just tinker with things we already own
ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version
The post StrongPity espionage campaign targeting Android users appeared first on WeLiveSecurity
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings
The post Cracked it! Highlights from KringleCon 5: Golden Rings appeared first on WeLiveSecurity
Hybrid work and hybrid play now merge into hybrid living, but where is the line between the two? Is there one?
The post Hybrid work: Turning business platforms into preferred social spaces appeared first on WeLiveSecurity
Why schools, hospitals, local governments and other public sector organizations are in a sweet spot for ransomware attacks
The post Ransomware target list – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Are your virtual doctor visits private and secure? Here’s what to know about, and how to prepare for, connecting with a doctor from the comfort of your home.
The post The doctor will see you now … virtually: Tips for a safe telehealth visit appeared first on WeLiveSecurity
With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control
Do you use any of these extremely popular – and eminently hackable – passwords? If so, we have a New Year’s resolution for you.
The post The world’s most common passwords: What to do if yours is on the list appeared first on WeLiveSecurity
What are some of the key cybersecurity trends and themes that organizations should have on their radars in 2023?
The post Cybersecurity trends and challenges to look out for in 2023 appeared first on WeLiveSecurity
Former Australian prime minister Scott Morrison among politicians and celebrities whose details were in sample of allegedly hacked data published online
The former Australian prime minister Scott Morrison appears to have been caught up in a leak of partial data on 400 million Twitter users, along with celebrities including the model Cara Delevingne, US politician Alexandria Ocasio-Cortez and pop singer Shawn Mendes.
Morrison’s Twitter account was included in a sample of data released by an alleged cybercriminal last week.Continue reading...
The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022
The post 2022 in review: 10 of the year’s biggest cyberattacks appeared first on WeLiveSecurity
It’s all fun and games over the holidays, but is your young gamer safe from the darker side of the action?
The post ‘Tis the season for gaming: Keeping children safe (and parents sane) appeared first on WeLiveSecurity