Saturday, November 17, 2018
We Live Security

Week in security with Tony Anscombe

GDPR-themed WordPress plugin flaw exploited. Google’s data charts path to avoiding malware on Android. Plus security researchers bypass encryption on self-encrypting drives The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
We Live Security

Security researchers bypass encryption on self-encrypting drives

Industry standard specification does not guarantee the safety of the self-encrypting drives despite verification The post Security researchers bypass encryption on self-encrypting drives appeared first on WeLiveSecurity
We Live Security

Employees’ cybersecurity habits worsen, survey finds

Almost all young people recycle their passwords, often doing so across work and personal accounts The post Employees’ cybersecurity habits worsen, survey finds appeared first on WeLiveSecurity
We Live Security

Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites

The campaign’s goals aren’t immediately clear, as the malefactors don’t appear to be leveraging the hijacked websites for further nefarious purposes The post Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites appeared first on WeLiveSecurity
We Live Security

Malware of the 90s: Remembering the Michelangelo and Melissa viruses

A look back at two of the most damaging malicious codes of the 1990s The post Malware of the 90s: Remembering the Michelangelo and Melissa viruses appeared first on WeLiveSecurity
We Live Security

Google’s data charts path to avoiding malware on Android

How much higher are the odds that your device will be exposed to malware if you download apps from outside Google Play or if you use one of Android’s older versions? Google has the numbers The post Google’s data charts...
We Live Security

Emotet launches major new spam campaign

The recent spike in Emotet activity shows that it remains an active threat The post Emotet launches major new spam campaign appeared first on WeLiveSecurity
We Live Security

Week in security with Tony Anscombe

Latest ESET research shows just how far attackers will go in order to steal bitcoin from customers of one specific virtual currency exchange The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
We Live Security

US Air Force invites white hats to find hackable flaws, again

This is the third time that the air force wants ethical hackers to uncover chinks in its digital armor The post US Air Force invites white hats to find hackable flaws, again appeared first on WeLiveSecurity
We Live Security

The cyber insurance question

Prevention is the best option but people continue to search for the easiest way out The post The cyber insurance question appeared first on WeLiveSecurity
We Live Security

New Chrome version aims to remove all ads from abusive sites

The move is part of Google’s continued clampdown on adverts that are intended to hoodwink users The post New Chrome version aims to remove all ads from abusive sites appeared first on WeLiveSecurity
We Live Security

Supply-chain attack on cryptocurrency exchange gate.io

Latest ESET research shows just how far attackers will go in order to steal bitcoin from customers of one specific virtual currency exchange The post Supply-chain attack on cryptocurrency exchange gate.io appeared first on WeLiveSecurity
We Live Security

Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm

This instalment in our series of articles to mark Antimalware Day tells the stories behind two creations that are representative of the 1980s: a virus viewed as the first-ever PC virus and a worm that caused the greatest damage...
We Live Security

Week in security with Tony Anscombe

Halloween has provided a timely opportunity to remind kids that not everything on the Internet is as it seems. The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
We Live Security

Antimalware Day and the evolution of malicious code

Celebrated annually on November 3, Antimalware Day is an opportunity to recognize the work of cybersecurity professionals The post Antimalware Day and the evolution of malicious code appeared first on WeLiveSecurity
SC Magazine

Instagram flaw exposes user passwords

A security flaw in Instagram’s recently released “Download Your Data” tool could have exposed some user passwords, the company reportedly told users. The tool, revealed by Instagram right before the GDPR regulation went into effect, is designed to let users...

Julian Assange Charges, Japan’s Top Cybersecurity Official, and More Security News This Week

Safer browsing, more bitcoin scams, and the rest of the week's top security news.
The Register

SMS 2FA database leak drama, MageCart mishaps, Black Friday badware, and more

Plus, why is Kaspersky Lab getting into chess? Roundup  What a week it has been: we had the creation of a new government agency, a meltdown flashback, and of course, Patch Tuesday.…
TechRepublic

Is retaining a cybersecurity attorney a good idea for your business?

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

Machine Learning Can Create Fake ‘Master Key’ Fingerprints

Researchers have refined a technique to create so-called DeepMasterPrints, fake fingerprints designed to get past security.