Read full post These apps, among others, apparently pose a serious threat to business security.
Read full post The annual Virus Bulletin International Conference takes place in Madrid, Spain this October and ESET will be well represented across the three-day event. The post ESET at Virus Bulletin 2017 appeared first on WeLiveSecurity
Read full post Ransomware has become one of the most prevalent new cybersecurity threats faced by today’s enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization’s ransomware experiences, defense plans, and...
Read full post Credit bureau provides update on its breach investigation.
Read full post Revealing vendor’s name and pricing details a threat to national security, DC court says.
Read full post Your daily round-up of some of the other stories in the news
Read full post Google broadens HTTPS Strict Transport Security to Top Level Domains under its control and makes them secure by default.
Read full post New to iOS 11? Here’s how you can conserve your battery power with the latest software update.
Read full post The UK National Lottery website and smartphone app are taken offline as a DDoS attack strikes. The post UK National Lottery knocked offline by DDoS attack appeared first on WeLiveSecurity
Read full post European Cyber Security Month and similar events, give cybersecurity companies the opportunity to reach out to the masses and get them involved. The post Global Cyber Security Month 2017 appeared first on WeLiveSecurity
Read full post CyberArk says the manner in which Defender scans for malicious executables in SMB shares gives attackers an opening.
Read full post Law enforcement agencies and governments haven’t lost their taste for data from the two tech titans’ devices, users and accounts.
Read full post That’s it, case closed: the media companies that filed a Freedom of Information Act request can’t appeal
Read full post The case sparked months of legal tension between Apple and the FBI, before federal agents eventually bought a hacking tool to break into a terrorist’s iPhone.
Read full post They’ll be easy to lock and unlock… and they don’t exist yet
Read full post The app’s novel approach turns Digital Rights Management on its head
Read full post Device-based data requests from government agencies dropped in the first half over last year, but Apple fulfilled a higher percentage of those requests, according to its transparency report.
Read full post We have surprisingly little data on how to evaluate infosec job candidates academic qualifications. That needs to change.
Read full post DirtyCOW can be used to compromise phones and tablets
Read full post Cloud services are very much what you make of them, and you need to apply at least an equivalent level of rigorousness, in terms of risk assessment, as you would with assets that are hosted on your...
Read full post Get the lowdown on Apple’s newly released Face ID Security Overview
Read full post Showtime Site Found Using Cryptocurrency Miner Following the discovery last week that ThePirateBay has been using a Monero miner to experiment with revenue alternatives for the site, researchers have found that both Showtime.com and ShowtimeAnytime.com have embedded...
Read full post Social media handles, aliases, associated identifiable information and search results are included
Read full post Cyberthieves are impersonating banks to send bogus “secure” bank email messages.
Read full post What’s safer? Using a numeric PIN code to unlock your Android smartphone or relying on a finger squiggle? The answer might surprise you. The post Your Android lock screen pattern isn’t as safe as a PIN code...
Read full post Device and requests went down, but secret and classified orders spiked by more than three-fold.