Tuesday, May 21, 2019
We Live Security

What the ban on facial recognition tech will – and will not – do

As San Francisco moves to regulate the use of facial recognition systems, we reflect on some of the many ‘faces’ of the fast-growing technology The post What the ban on facial recognition tech will – and will not – do...
We Live Security

Week in security with Tony Anscombe

ESET researchers detail how ASUS's cloud service has been abused to distribute the Plead malware; in other news, ESET's telemetry shows that the use of the EternalBlue exploit is reaching new highs The post Week in security with Tony Anscombe...
We Live Security

EternalBlue reaching new heights since WannaCryptor outbreak

Attack attempts involving the exploit are in hundreds of thousands daily The post EternalBlue reaching new heights since WannaCryptor outbreak appeared first on WeLiveSecurity
We Live Security

Survey: What should companies do to restore trust post-breach?

The ESET survey of thousands of people in Asia-Pacific (APAC) provides valuable insight into their perceptions of cyber-threats and various common aspects of online security The post Survey: What should companies do to restore trust post-breach? appeared first on WeLiveSecurity
We Live Security

Ice Hockey World Championship: The risks of free live streaming

You think you’re watching the games for free, but are you sure that's the case? Let’s review some of the risks that may come with free live streaming websites The post Ice Hockey World Championship: The risks of free live...
We Live Security

Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage

ESET researchers have discovered that the attackers have been distributing the Plead malware via compromised routers and man-in-the-middle attacks against the legitimate ASUS WebStorage software The post Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage appeared...
We Live Security

Verizon’s data breach report: What the numbers say

What are some of the most interesting takeaways from Verizon’s latest annual security report? The post Verizon’s data breach report: What the numbers say appeared first on WeLiveSecurity
We Live Security

Week in security with Tony Anscombe

ESET researchers detail the modus operandi of LightNeuron, a Microsoft Exchange backdoor that leverages a previously unseen persistence mechanism The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
We Live Security

Types of backup and five backup mistakes to avoid

What are the main types of backup operations and how can you avoid the sinking feeling that comes with the realization that you may not get your data back? The post Types of backup and five backup mistakes to avoid...
We Live Security

Hackers steal US$41 million worth of Bitcoin from cryptocurrency exchange

The thieves bade their time before running off with more than 7,000 Bitcoin ‘in one fell swoop’ The post Hackers steal US$41 million worth of Bitcoin from cryptocurrency exchange appeared first on WeLiveSecurity
We Live Security

Turla LightNeuron: An email too far

ESET research uncovers Microsoft Exchange malware remotely controlled via steganographic PDF and JPG email attachments The post Turla LightNeuron: An email too far appeared first on WeLiveSecurity
We Live Security

Week in security with Tony Anscombe

ESET researchers document how cybercriminals abused the advertising network of Russia's leading search engine for malicious campaigns targeting accountants The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
We Live Security

The UK plans to legislate to secure IoT, but is it really the answer?

A reflection on whether this approach to addressing IoT security challenges can ‘deliver the goods’ and how consumer awareness can help The post The UK plans to legislate to secure IoT, but is it really the answer? appeared first on...
We Live Security

World Password Day: A day to review your defenses

So, do you think you’ve been ‘pwned’? That’s the question to ask yourself today The post World Password Day: A day to review your defenses appeared first on WeLiveSecurity
We Live Security

D-Link camera vulnerability allows attackers to tap into the video stream

ESET researchers highlight a series of security holes in a device intended to make homes and offices more secure The post D-Link camera vulnerability allows attackers to tap into the video stream appeared first on WeLiveSecurity
Tripwire

HawkEye Attack Wave Sends Stolen Data to Another Keylogger Provider

A recent attack wave involving HawkEye malware sends data stolen from its victims to another keylogger provider’s website. On 21 May, My Online Security came across a new sample of HawkEye. The actual delivery mechanism itself wasn’t unique compared...

Washington Issues Temporary License to Huawei

Washington Issues Temporary License to Huawei The US government has issued a temporary license to Huawei and its affiliates, allowing American companies to supply the telecoms and handset giant until August. Despite reports emerging over the weekend of various chipmakers...
isBuzz

GDPR: The Best Strategy For International Businesses

The EU’s General Data Protection Regulation (GDPR) was created with the aim of homogenising data privacy laws across the EU. GDPR also applies to organisations outside the EU, if they monitor EU data subjects, or offer goods and services...
IBM Security

How Cyber-Secure Are Business Travelers? New Report Says Not Very

I travel frequently for business — to industry conferences such as RSA Conference and Black Hat and meeting with clients. Whenever I travel, I bring my work laptop, my personal cellphone enabled with work email and calendar, and, of...

Haas F1 team leans on service providers as security force multipliers

If today’s cars are smartphones on wheels, then race cars are supercomputers with engines attached. As the fastest racing sport in the world, Formula One cars come laden with over 100 sensors measuring every aspect of a car’s internal...