Cybersecurity News
Smart tech gifts: How to keep your kids and family safe
Cyberthreats can take the fun out of connected gadgets – here's how to make sure your children enjoy the tech without putting themselves or their family at risk
The post Smart tech gifts: How to keep your kids and family safe appeared first on WeLiveSecurity
Russian crypto-exchange Livecoin hacked after it lost control of its servers
Hackers gained access to the Livecoin portal and modified exchange rates to 10-15 times their normal values.Amazon Gift Card Scam Delivers Dridex This Holiday Season
Dridex operators launch a social engineering scam that promises victims a $100 gift card but delivers a banking Trojan.Citrix devices are being abused as DDoS attack vectors
Citrix says it's working on a fix, expected next year.Windows Zero-Day Still Circulating After Faulty Fix

Quarterbacking Vulnerability Remediation
It's time that security got out of the armchair and out on the field.HelpSystems Acquires Data Security Firm Vera
The purchase is intended to increase London-based HelpSystems' file collaboration security capabilities.Delivering Santa from Third-Party Risk

Microsoft, McAfee, Rapid7, and Others Form New Ransomware Task Force
Industry group wants to get a framework in the hands of the new administration's cybersecurity officials by early spring 2021.White Ops Announces Its Acquisition
A group including Goldman Sachs Merchant Banking Division, ClearSky Security, and NightDragon has purchased the human verification technology company.Lazarus Group Hits COVID-19 Vaccine-Maker in Espionage Attack

Data breach hits 30,000 signed up to workplace pensions provider

Fraud worries as UK company Now:Pensions says ‘third-party contractor’ posted personal details of clients to online public forum
About 30,000 customers of Now:Pensions face an anxious Christmas after a serious data breach at the pensions provider led to their sensitive personal details being posted on the internet.
In an email sent to affected customers, the workplace pensions firm warned that names, postal and email addresses, birth dates and National Insurance numbers all appeared in a public forum online.
Continue reading...Lazarus Group Seeks Intelligence Related to COVID-19
Researchers attribute attacks targeting a pharmaceutical company and a government ministry related to COVID-19 response.Third-Party APIs: How to Prevent Enumeration Attacks

Hey Alexa, Who Am I Messaging?

Emotet Returns to Hit 100K Mailboxes Per Day

Enterprise IoT Security Is a Supply Chain Problem
Organizations that wish to take advantage of the potential benefits of IoT systems in enterprise environments should start evaluating third-party risk during the acquisition process.7 ways malware can get into your device
You know that malware is bad, but are you also aware of the various common ways in which it can infiltrate your devices?
The post 7 ways malware can get into your device appeared first on WeLiveSecurity