Cybersecurity News
How to secure your digital Christmas presents
What are some of the key things you should do with your shiny new device as soon as you unbox it?
The post How to secure your digital Christmas presents appeared first on WeLiveSecurity
How to secure your digital Christmas presents
What are some of the key things you should do with your shiny new device as soon as you unbox it?
The post How to secure your digital Christmas presents appeared first on WeLiveSecurity
Week in security with Tony Anscombe
ESET's free BlueKeep vulnerability checker – Dangerous PayPal-themed scam – This year's worst passwords
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Week in security with Tony Anscombe
ESET's free BlueKeep vulnerability checker – Dangerous PayPal-themed scam – This year's worst passwords
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Ambitious scam wants far more than just PayPal logins
An ongoing phishing scam uncovered by ESET researchers seeks to wreak havoc on your money and digital life in one fell swoop
The post Ambitious scam wants far more than just PayPal logins appeared first on WeLiveSecurity
Ambitious scam wants far more than just PayPal logins
An ongoing phishing scam uncovered by ESET researchers seeks to wreak havoc on your money and digital life in one fell swoop
The post Ambitious scam wants far more than just PayPal logins appeared first on WeLiveSecurity
38,000 people forced to pick up email passwords in person
Malware and legal requirements force academics and students to join a near-endless line in order to pick up their passwords
The post 38,000 people forced to pick up email passwords in person appeared first on WeLiveSecurity
38,000 people forced to pick up email passwords in person
Malware and legal requirements force academics and students to join a near-endless line in order to pick up their passwords
The post 38,000 people forced to pick up email passwords in person appeared first on WeLiveSecurity
Increasing Industry Participation and Knowledge
Increasing industry participation and knowledge is a core pillar in the PCI Security Standards Council’s strategic framework, which guides how the Council achieves its mission and supports the needs of the global payments industry. To round out our Q&A blog series introducing the framework, we interview PCI SSC Executive Director Lance Johnson on this foundational strategic pillar and how it ties the framework together.
Nuclear Bot Author Arrested in Sextortion Case
Last summer, a wave of sextortion emails began flooding inboxes around the world. The spammers behind this scheme claimed they'd hacked your computer and recorded videos of you watching porn, and promised to release the embarrassing footage to all your contacts unless a bitcoin demand was paid. Now, French authorities say they've charged two men they believe are responsible for masterminding this scam. One of them is a 21-year-old hacker interviewed by KrebsOnSecurity in 2017 who openly admitted to authoring a banking trojan called "Nuclear Bot."It’s time to disconnect RDP from the internet
Brute-force attacks and BlueKeep exploits usurp convenience of direct RDP connections; ESET releases a tool to test your Windows machines for vulnerable versions
The post It’s time to disconnect RDP from the internet appeared first on WeLiveSecurity
It’s time to disconnect RDP from the internet
Brute-force attacks and BlueKeep exploits usurp convenience of direct RDP connections; ESET releases a tool to test your Windows machines for vulnerable versions
The post It’s time to disconnect RDP from the internet appeared first on WeLiveSecurity
Ransomware Gangs Now Outing Victim Businesses That Don’t Pay Up
As if the scourge of ransomware wasn't bad enough already: Several prominent purveyors of ransomware have signaled they plan to start publishing data stolen from victims who refuse to pay up. To make matters worse, one ransomware gang has now created a public Web site identifying recent victim companies that have chosen to rebuild their operations instead of acquiescing to their tormentors.The worst passwords of 2019: Did yours make the list?
These passwords may win the popularity contest but lose flat out in security
The post The worst passwords of 2019: Did yours make the list? appeared first on WeLiveSecurity
The worst passwords of 2019: Did yours make the list?
These passwords may win the popularity contest but lose flat out in security
The post The worst passwords of 2019: Did yours make the list? appeared first on WeLiveSecurity
Inside ‘Evil Corp,’ a $100M Cybercrime Menace
The U.S. Justice Department this month offered a $5 million bounty for information leading to the arrest and conviction of a Russian man indicted for allegedly orchestrating a vast, international cybercrime network that called itself "Evil Corp" and stole roughly $100 million from businesses and consumers. As it happens, for several years KrebsOnSecurity closely monitored the day-to-day communications and activities of the accused and his accomplices. What follows is an insider's look at the back-end operations of this gang.Dominic Cummings: If Leave had lost Brexit vote, I’d have queried result as invalid

Boris Johnson’s adviser Dominic Cummings would have challenged the EU referendum result as “invalid” had Vote Leave lost the Brexit campaign.
According to documents seen by the Observer, the prime minister’s chief aide told the UK’s data watchdog that he would have contested the result because UK elections are “wide open to abuse.”
Continue reading...Week in security with Tony Anscombe
ESET's Cybersecurity Trends 2020 report is out – New Chrome feature boosts account security – Hundreds of thousands of birth certificate applications leaked online
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Week in security with Tony Anscombe
ESET's Cybersecurity Trends 2020 report is out – New Chrome feature boosts account security – Hundreds of thousands of birth certificate applications leaked online
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
2FA: Double down on your security
The second authentication factor might be a minor inconvenience, but it provides a major security boost
The post 2FA: Double down on your security appeared first on WeLiveSecurity