Month: February 2017

10 reasons why cybercriminals target smartphones

Read full post There is a real feeling that smartphones are becoming a bigger target for cybercriminals. So why are they so eager to get into our devices? The post 10 reasons why cybercriminals target smartphones appeared first on WeLiveSecurity

/ February 28, 2017

10 reasons why cybercriminals target smartphones

Read full post There is a real feeling that smartphones are becoming a bigger target for cybercriminals. So why are they so eager to get into our devices? The post 10 reasons why cybercriminals target smartphones appeared first on WeLiveSecurity

/ February 28, 2017

DNS attacks: How they try to direct you to fake pages

Read full post ESET’s Josep Albors looks at how DNS attacks will try and direct you to fake pages. The post DNS attacks: How they try to direct you to fake pages appeared first on WeLiveSecurity

/ February 27, 2017

DNS attacks: How they try to direct you to fake pages

Read full post ESET’s Josep Albors looks at how DNS attacks will try and direct you to fake pages. The post DNS attacks: How they try to direct you to fake pages appeared first on WeLiveSecurity

/ February 27, 2017

British man arrested after 900,000 broadband routers knocked offline in Germany

Read full post A 29-year-old man has been arrested at Luton airport by the UK’s National Crime Agency (NCA) in connection with a massive internet attack that disrupted telephone, television and internet services in Germany last November. The post British...

/ February 24, 2017

British man arrested after 900,000 broadband routers knocked offline in Germany

Read full post A 29-year-old man has been arrested at Luton airport by the UK’s National Crime Agency (NCA) in connection with a massive internet attack that disrupted telephone, television and internet services in Germany last November. The post British...

/ February 24, 2017

A Primer on GDPR

Read full post At BH Consulting we have worked with our friends over at Tripwire to produce some material for those of you wishing to better understand the implications the forthcoming EU General Data Protection Regulation (GDPR) which comes into...

/ February 24, 2017

Released Android malware source code used to run a banking botnet

Read full post ESET researchers have discovered a new variant of botnet-forming Android banking malware based on source code made public a couple of months ago. The post Released Android malware source code used to run a banking botnet appeared...

/ February 23, 2017

Released Android malware source code used to run a banking botnet

Read full post ESET researchers have discovered a new variant of botnet-forming Android banking malware based on source code made public a couple of months ago. The post Released Android malware source code used to run a banking botnet appeared...

/ February 23, 2017

Sunny with a chance of stolen credentials: Malicious weather app found on Google Play

Read full post ESET has spotted a new banking malware on Google Play. Disguised as a weather forecast app, it steals banking credentials and locks screens. The post Sunny with a chance of stolen credentials: Malicious weather app found on...

/ February 22, 2017

Sunny with a chance of stolen credentials: Malicious weather app found on Google Play

Read full post ESET has spotted a new banking malware on Google Play. Disguised as a weather forecast app, it steals banking credentials and locks screens. The post Sunny with a chance of stolen credentials: Malicious weather app found on...

/ February 22, 2017

New crypto-ransomware hits macOS

Read full post This last month we have seen a new ransomware for Mac. Written in Swift, it is distributed on BitTorrent distribution site as “Patcher” for pirating popular software. The post New crypto-ransomware hits macOS appeared first on WeLiveSecurity

/ February 22, 2017

New crypto-ransomware hits macOS

Read full post This last month we have seen a new ransomware for Mac. Written in Swift, it is distributed on BitTorrent distribution site as “Patcher” for pirating popular software. The post New crypto-ransomware hits macOS appeared first on WeLiveSecurity

/ February 22, 2017

Android malware: It doesn’t hurt to know about this

Read full post Android malware is an increasing problem … but worry not – n this infographic, we highlight some of the key things you should be aware of. The post Android malware: It doesn’t hurt to know about this...

/ February 21, 2017

Android malware: It doesn’t hurt to know about this

Read full post Android malware is an increasing problem … but worry not – n this infographic, we highlight some of the key things you should be aware of. The post Android malware: It doesn’t hurt to know about this...

/ February 21, 2017

Healthcare data breaches reach a ‘sizeable number of US consumers’

Read full post Approximately 26% of Americans have been compromised by healthcare data breaches, according to a new survey from Accenture. The post Healthcare data breaches reach a ‘sizeable number of US consumers’ appeared first on WeLiveSecurity

/ February 21, 2017

Healthcare data breaches reach a ‘sizeable number of US consumers’

Read full post Approximately 26% of Americans have been compromised by healthcare data breaches, according to a new survey from Accenture. The post Healthcare data breaches reach a ‘sizeable number of US consumers’ appeared first on WeLiveSecurity

/ February 21, 2017

RTM: Stealthy group targeting remote banking system

Read full post Today, ESET has released a white paper on RTM, a cybercrime group that has been relentlessly targeting businesses in Russia and neighboring countries. The post RTM: Stealthy group targeting remote banking system appeared first on WeLiveSecurity

/ February 21, 2017

RTM: Stealthy group targeting remote banking system

Read full post Today, ESET has released a white paper on RTM, a cybercrime group that has been relentlessly targeting businesses in Russia and neighboring countries. The post RTM: Stealthy group targeting remote banking system appeared first on WeLiveSecurity

/ February 21, 2017

It’s too easy to steal a second-hand connected car

Read full post Until more effort is made by vendors to integrate the internet in a safe way into the myriad of devices that surround us, we are going to hear more and more stories of security breaking down like...

/ February 20, 2017

It’s too easy to steal a second-hand connected car

Read full post Until more effort is made by vendors to integrate the internet in a safe way into the myriad of devices that surround us, we are going to hear more and more stories of security breaking down like...

/ February 20, 2017

Support scams now reign in Spain

Read full post If you thought that the problem of tech support scams was disappearing, think again, says Josep Albors and David Harley. The post Support scams now reign in Spain appeared first on WeLiveSecurity

/ February 20, 2017

Support scams now reign in Spain

Read full post If you thought that the problem of tech support scams was disappearing, think again, says Josep Albors and David Harley. The post Support scams now reign in Spain appeared first on WeLiveSecurity

/ February 20, 2017

Make it public or private…how secure is your profile online?

Read full post Part 1 Did you ever ask yourself if you care what personal information you give out online or in exchange for a “free” service?  Do you really want to mix your colleagues with a friends or family...

/ February 20, 2017

Trends in Android ransomware

Read full post 2016 saw interesting developments within the Android ransomware scene. Ransomware emerged as one of the most pressing cybersecurity issues on the mobile platform. The post Trends in Android ransomware appeared first on WeLiveSecurity

/ February 20, 2017

Trends in Android ransomware

Read full post 2016 saw interesting developments within the Android ransomware scene. Ransomware emerged as one of the most pressing cybersecurity issues on the mobile platform. The post Trends in Android ransomware appeared first on WeLiveSecurity

/ February 20, 2017

RSA – day 3: Security for those who don’t know what that means

Read full post Here at RSA, an increasing amount of security purchases are made by those who got the task dumped in their laps, but who have little or no formal or practical training. The post RSA – day 3:...

/ February 18, 2017

RSA – day 3: Security for those who don’t know what that means

Read full post Here at RSA, an increasing amount of security purchases are made by those who got the task dumped in their laps, but who have little or no formal or practical training. The post RSA – day 3:...

/ February 18, 2017

8 things you should know about spyware

Read full post WeLiveSecurity takes a look at what you need to know about spyware – the malware secretly prying on your online activities. The post 8 things you should know about spyware appeared first on WeLiveSecurity

/ February 17, 2017

8 things you should know about spyware

Read full post WeLiveSecurity takes a look at what you need to know about spyware – the malware secretly prying on your online activities. The post 8 things you should know about spyware appeared first on WeLiveSecurity

/ February 17, 2017

RSA 2017 – day 2: Attacking yourself

Read full post Want to find holes in your security perimeter? What better way than to attempt to attack yourself, and here at RSA there are plenty of tools to help. The post RSA 2017 – day 2: Attacking yourself...

/ February 17, 2017

RSA 2017 – day 2: Attacking yourself

Read full post Want to find holes in your security perimeter? What better way than to attempt to attack yourself, and here at RSA there are plenty of tools to help. The post RSA 2017 – day 2: Attacking yourself...

/ February 17, 2017

Demystifying targeted malware used against Polish banks

Read full post The purpose of this blog is to deliver technical details of an as-yet minimally documented malware that has made headlines in Poland. The post Demystifying targeted malware used against Polish banks appeared first on WeLiveSecurity

/ February 16, 2017

Demystifying targeted malware used against Polish banks

Read full post The purpose of this blog is to deliver technical details of an as-yet minimally documented malware that has made headlines in Poland. The post Demystifying targeted malware used against Polish banks appeared first on WeLiveSecurity

/ February 16, 2017

RSA 2017: The year the little guys get swallowed up

Read full post RSA feels like a mashup of giant tech Titans steadily swallowing up the little guys to make one massive, unholy tech monster. But how does that really work for small businesses as customers, and the rest of...

/ February 16, 2017

RSA 2017: The year the little guys get swallowed up

Read full post RSA feels like a mashup of giant tech Titans steadily swallowing up the little guys to make one massive, unholy tech monster. But how does that really work for small businesses as customers, and the rest of...

/ February 16, 2017

Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected?

Read full post Gmail rolls out a new policy to block JavaScript attachments, increasing security restrictions as ransomware attacks increase. The post Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected? appeared first on WeLiveSecurity

/ February 16, 2017

Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected?

Read full post Gmail rolls out a new policy to block JavaScript attachments, increasing security restrictions as ransomware attacks increase. The post Gmail starts blocking JavaScript attachments: Alternative infector vectors to be expected? appeared first on WeLiveSecurity

/ February 16, 2017

Organizations ‘concerned by cybersecurity skills gap’

Read full post The ongoing cybersecurity skills gap is dealing a significant blow to the confidence of organizations looking to defend themselves against potential attacks. The post Organizations ‘concerned by cybersecurity skills gap’ appeared first on WeLiveSecurity

/ February 16, 2017

Organizations ‘concerned by cybersecurity skills gap’

Read full post The ongoing cybersecurity skills gap is dealing a significant blow to the confidence of organizations looking to defend themselves against potential attacks. The post Organizations ‘concerned by cybersecurity skills gap’ appeared first on WeLiveSecurity

/ February 16, 2017