IT Security News
Costco 40th anniversary scam targets WhatsApp users
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is
The post Costco 40th anniversary scam targets WhatsApp users appeared first on WeLiveSecurity
Do back offices mean backdoors?
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
The post Do back offices mean backdoors? appeared first on WeLiveSecurity
5 ways cybercriminals steal credit card details
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe
The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity
Instagram’s new age verification tool – Week in security with Tony Anscombe
As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?
The post Instagram’s new age verification tool – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Virtual private networks: 5 common questions about VPNs answered
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity
Phishing awareness training: Help your employees avoid the hook
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity
Crypto mixers: What are they and how are they used?
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity
How to spot malicious spam – Week in security with Tony Anscombe
As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
The post How to spot malicious spam – Week in security with Tony Anscombe appeared first on WeLiveSecurity
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
The post How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security appeared first on WeLiveSecurity
Industroyer: A cyber‑weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
The post Industroyer: A cyber‑weapon that brought down a power grid appeared first on WeLiveSecurity
Investor Group Led by Advent International and Permira Completes Acquisition of McAfee New McAfee Global Research Shows Children and Teens Are More Vulnerable Than Ever to Sophisticated Mobile Threats Indian Consumers Prioritize Protection Over Convenience McAfee India 2022 Trends Survey McAfee Continues to Provide Leading Online Protection to Consumers McAfee Total Protection Named “Product of the Year” by AV-Comparatives Consumers Prioritize Protection Over Convenience in McAfee 2022 Trends Survey McAfee’s Pure-Play Consumer Business Grows 24% in Q3’21 McAfee to Be Acquired by an Investor Group for over $14 Billion McAfee Announces Date for Third Quarter 2021 Earnings Conference Call McAfee Appoints Former Deloitte Partner Emily Rollins to its Board of Directors
|