Cyber Security

0 Comments
Ransomware remains a serious threat and this new white paper explains what enterprises need to know, and do, to reduce risk Throughout 2018 criminals have continued to target large organizations with ransomware. Today we introduce a new white paper that explains why ransomware is still a serious threat to your organization – regardless of size
0 Comments
Proper preparation can make all the difference when it comes to speaking at conferences I promised some further thoughts on making the presentation process more comfortable: it seems to me that (in general) the more comfortable the speaker, the better the experience for the listener. And for most of us, the key to a comfortable
0 Comments
Customers see their admin credentials stolen and their servers infected with Linux/ChachaDDoS In recent months, numerous users of VestaCP, a hosting control panel solution, have received warnings from their service providers that their servers were using an abnormal amount of bandwidth. We know now that these servers were in fact used to launch DDoS attacks. Analysis
0 Comments
What are the emotional triggers and errors in judgment that make you fall for an online scam? Con artists have been plying their trade since time immemorial, but the internet opened the floodgates to a whole new level of fraud. It has allowed fraudsters to take aim at an endless number of victims and at
0 Comments
ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks Recent ESET research has uncovered details of the successor of the BlackEnergy APT group, whose main toolset was last seen in December 2015 during the first-ever blackout caused by a cyberattack. Around the time
0 Comments
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things Several global book publishing houses and an international literary scouting agency have warned their staff of a flurry of phishing emails that seek authors’ and publishers’ sensitive information, including book manuscripts, The Bookseller reports. Penguin Random
0 Comments
The times they are a-changin‘, so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution? With digital transformation moving apace, hardly any aspect of our lives is spared the dramatic effects of lightning-fast technological advances. The workplace is no exception, as the ubiquity of
0 Comments
ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven Among the most significant malware-induced cybersecurity incidents in recent years were the attacks against the Ukrainian power grid
0 Comments
The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets California has passed a piece of legislation that bans weak default passwords on internet-connected devices sold in the region. Under the “Information privacy: connected devices” bill – which is the first Internet-of-Things (IoT)
0 Comments
A closer look at the technology that is rapidly growing in popularity Blockchain is generally associated with Bitcoin and other cryptocurrencies, but these are just the tip of the iceberg.  This technology was originally conceived in 1991, when Stuart Haber and W. Scott Stornetta described their first work on a chain of cryptographically secured blocks, but only gained notoriety in
0 Comments
Some tips for helping to keep your data more secure from the floor of VB 2018 With the proliferation of more advanced and freely available toolsets, commoditization of attack launch platforms, and availability of wholesale large-capacity network bandwidth for rent, cyberattack velocity is ramping up. If there’s a new vulnerability released you’ll get hit harder
0 Comments
WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals Information and communications technologies permeate our day-to-day lives and are vital for the daily operations of both enterprises and governments. This
0 Comments
It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps Facebook disclosed on Friday, September 28, that attackers had exploited a flaw in its code that allowed them “to steal Facebook access tokens which they