How to break into cybersecurity – Is your password easy to guess? – Shining a spotlight on the security risks of shadow IT The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era The post What’s lurking in the shadows? How to manage the security risks of shadow IT appeared first on WeLiveSecurity
Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track. The post Cybersecurity careers: What...
Brave Search will become the default search option for new users in the US, UK, Canada, Germany and France, with more countries to follow soon The post Brave browser replaces Google with its own search engine appeared first on WeLiveSecurity
Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds The post $5.2 billion worth of Bitcoin transactions possibly tied to ransomware appeared first on WeLiveSecurity
Security professionals advise to never use ‘beef stew’ as a password. It just isn’t stroganoff. The post A recipe for failure: Predictably poor passwords appeared first on WeLiveSecurity
Phishing and how to avoid taking the bait – Offboarding employees securely – Why old malware refuses to die The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Putting a precision payload on top of more generic malware makes perfect sense for malware operators The post Virus Bulletin: Old malware never dies – it just gets more targeted appeared first on WeLiveSecurity
There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe? The post Employee offboarding: Why companies must close a...
If it looks like a duck, swims like a duck, and quacks like a duck, then it's probably a duck. Now, how do you apply the duck test to defense against phishing? The post Don’t get phished! How to be...
The attack, which clocked in at 2.4 Tbps, targeted one of Azure customers based in Europe The post Microsoft thwarts record‑breaking DDoS attack appeared first on WeLiveSecurity
The victims lost an average of nine days to downtime and two-and-a-half months to investigations, an analysis of disclosed attacks shows The post Ransomware cost US companies almost $21 billion in downtime in 2020 appeared first on WeLiveSecurity
ESET research discovers ESPecter bootkit – FontOnLake targeting Linux – Fake SafeMoon app update The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET researchers discover a malware family with tools that show signs they’re used in targeted attacks The post FontOnLake: Previously unknown malware family targeting Linux appeared first on WeLiveSecurity
Two-factor authentication is a simple way to greatly enhance the security of your account The post Google to turn on 2FA by default for 150 million users, 2 million YouTubers appeared first on WeLiveSecurity