Cybersecurity News
Cyberawareness in Australia: The good and the bad
An ESET-commissioned survey sheds light on the browsing habits of Australians and how they protect themselves online
The post Cyberawareness in Australia: The good and the bad appeared first on WeLiveSecurity
Cyberawareness in Australia: The good and the bad
An ESET-commissioned survey sheds light on the browsing habits of Australians and how they protect themselves online
The post Cyberawareness in Australia: The good and the bad appeared first on WeLiveSecurity
Israeli spyware firm fails to get hacking case dismissed

Judge orders NSO Group to fight case brought by Saudi activist and pay his legal costs
An Israeli judge has rejected an attempt by the spyware firm NSO Group to dismiss a case brought against it by a prominent Saudi activist who alleged that the company’s cyberweapons were used to hack his phone.
The decision could add pressure on the company, which faces multiple accusations that it sold surveillance technology, named Pegasus, to authoritarian regimes and other governments that have allegedly used it to target political activists and journalists.
Continue reading...Proof-of-concept exploits published for the Microsoft-NSA crypto bug
Two proof-of-concept exploits published for the CurveBall (CVE-2020-0601) vulnerability.I’m still on Windows 7 – what should I do?

Support for Windows 7 has ended, leaving Marcy wondering how they can protect themselves
I do a lot of work on a Windows 7 desktop PC that is about five years old. I’m a widow and can’t afford to run out and get a new PC at this time, or pay for Windows 10. If I do stay with Windows 7, what should I worry about, and how can I protect myself? I have been running Kaspersky Total Security for several years, which has worked well so far. Marcy
Microsoft Windows 7 – launched in 2009 – came to the end of its supported life on Tuesday. Despite Microsoft’s repeated warnings to Windows 7 users, there may still be a couple of hundred million users, many of them in businesses. What should people do next?
Continue reading...What is Malware
Malware is software--a computer program--used to perform malicious actions. In fact, the term malware is a combination of the words malicious and software. Cyber criminals install malware on your computers or devices to gain control over them or gain access to what they contain. Once installed, these attackers can use malware to spy on your online activities, steal your passwords and files, or use your system to attack others.Chinese man arrested after making $1.6 million from selling VPN services
Chinese authorities continue their crackdown against unauthorized VPN services with what appears to be their biggest catch so far.2017 Data Breach Will Cost Equifax at Least $1.38 Billion
Company agrees to set aside a minimum of $380.5 million as breach compensation and spend another $1 billion on transforming its information security over the next five years. The 147 million US consumers affected by the breach have one week from today to file a claim.Critical WordPress Bug Leaves 320,000 Sites Open to Attack

A Practical Guide to Zero-Trust Security

Google Lets iPhone Users Turn Device into Security Key
The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.Podcast: NSA Reports Major Crypto-Spoofing Bug to Microsoft

Why Firewalls Aren't Going Anywhere
Written off multiple times as obsolete, firewalls continue to elude demise by adding features and ensuring that VPNs keep humming.U.N. Weathers Storm of Emotet-TrickBot Malware

Equifax Settles Class-Action Breach Lawsuit for $380.5M

How to Comprehend the Buzz About Honeypots

New Report Spotlights Changes in Phishing Techniques
Common and evolving strategies include the use of zero-font attacks, homograph attacks, and new tactics for fake attachments.More than 600 million users installed Android 'fleeceware' apps from the Play Store
A new set of 25 Android apps caught illegally charging users at the end of a trial period.ISACs Join Forces to Secure the Travel Industry
Together, the Travel & Hospitality ISAC and the Retail & Hospitality ISAC intend to improve communications and collaboration about the evolving threat landscape.Trump Slams Apple for Refusing to Unlock Suspected Shooter’s iPhones
