Cyber Security

0 Comments
Far-fetched though it may sound, the answer is yes, according to researchers, who show that electrical grids and smart home appliances could make for a dangerous mix Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to
0 Comments
All things labeled Artificial Intelligence (AI) or Machine Learning (ML) are making waves, but talk of them in cybersecurity contexts often muddies the waters. A new ESET white paper sets out to bring some clarity to a subject where confusion often reigns supreme It is no mean feat to find an area in business and
0 Comments
The move is part of a three-pronged plan that is intended to bolster user trust and safety on the photo-sharing platform Instagram has announced that its users will soon be able to secure their accounts with third-party authentication apps. Prior to the announcement of this much-anticipated change, the photo-sharing platform supported only SMS-based two-factor authentication
0 Comments
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year Mobile security plays an increasingly important role in the protection of information assets, and this applies to both home and corporate users. So, this publication will focus on analyzing the
0 Comments
The Bugcrowd crowdsourcing platform launched Bugcrowd University, an educational platform for security researchers that aims to contribute to the development of bug hunting skills Bugcrowd University (BCU) was developed with the aim of promoting the development and education of security professionals, sharing the latest technologies and contributing to the development of bug hunting skills. As
0 Comments
The latest ESET research offers a rare glimpse into the mechanics of a particularly stealthy and resilient backdoor that the Turla cyberespionage group can fully control via PDF files attached to emails ESET researchers have investigated a distinctive backdoor used by the notorious Advanced Persistent Threat (APT) group known as Turla (or Snake, or Uroburos)
0 Comments
Internet-connected irrigation systems suffer from security gaps that could be exploited by attackers aiming, for example, to deplete a city’s water reserves, researchers warn Security researchers have warned of a potential attack that – using a “piping botnet” of internet-connected irrigation systems that water simultaneously – could impact a city’s water system to the point
0 Comments
An overview of some of the cyberattacks that Canadian organizations faced in the summer months of 2018 The summer season often seems like a quieter time of year. The past few months have been eventful in Canada, however, as several incidents reported in the media have highlighted the importance of cybersecurity once again. First, several
0 Comments
Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable Researchers at New York University have come up with an unconventional defensive technique that could ultimately deter attackers from even trying to write exploits targeting software vulnerabilities. In a departure with the usual ways of addressing bugs, which normally involve eliminating known
0 Comments
The first week in security video round-up from WeLiveSecurity Welcome to the first ever week in security video round-up. This weekly video will bring you some of the biggest industry news that we have covered here on WeLiveSecurity. The videos will be presented by ESET’s Global Security Evangelist & Industry Ambassador Tony Anscombe. In this
0 Comments
If you’re an Instagrammer, you may want to take some basic precautions, such as picking a strong and unique password and signing up for two-factor authentication sooner rather than later Hundreds of Instagram users are reportedly experiencing an apparently coordinated hack, leaving them with their accounts hijacked and personal information altered – all the while
0 Comments
Aiming to protect critical infrastructure against attacks Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days. While industrial control protocols themselves are
0 Comments
The nature of the vulnerability hasn’t been disclosed, but is said to have already been identified and fixed Several hundred inmates at five prisons in the northwestern US state of Idaho have exploited a software vulnerability in their “prison-specific” tablets to transfer $225,000 worth of digital credits to their virtual accounts, according to a BBC
0 Comments
But don’t get too excited just yet: the first-of-its-kind bug bounty program for printers is invite-only for now Researchers can earn up to $10,000 for identifying security flaws in printers made by HP in what is the first bug bounty program aimed specifically at printers, according to an announcement by the tech giant on Tuesday.