Tuesday, March 31, 2020
We Live Security

Have you backed up your smartphone lately?

With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that your personal data remains safe The post Have you backed up your smartphone lately? appeared first on WeLiveSecurity
We Live Security

Work from home: Videoconferencing with security in mind

With COVID-19 concerns canceling face-to-face meetings, be aware of the security risks of videoconferencing and how to easily overcome them The post Work from home: Videoconferencing with security in mind appeared first on WeLiveSecurity
We Live Security

Week in security with Tony Anscombe

What COVID-19 may mean for privacy rights – Managing supply-chain disruptions – Unpatched Windows zero-day under attack The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
We Live Security

What happens when the global supply chain breaks?

If we can’t secure the supply chain, eventually everything else will break The post What happens when the global supply chain breaks? appeared first on WeLiveSecurity
We Live Security

6 tips for safe and secure remote working

Getting cybersecurity right in the work-from-home world can feel daunting. ESET Chief Security Evangelist Tony Anscombe shares 6 best practices that will steer you in the right direction. The post 6 tips for safe and secure remote working appeared first...
We Live Security

HPE issues fix to stop some SSDs from self‑destructing

If left unpatched, a firmware flaw in some enterprise-class solid-state drives could make data on them unrecoverable as early as this fall. The post HPE issues fix to stop some SSDs from self‑destructing appeared first on WeLiveSecurity
We Live Security

Public health vs. personal privacy: Choose only one?

As the world turns to technology to track and contain the COVID-19 pandemic, could this sound the death knell for digital privacy? The post Public health vs. personal privacy: Choose only one? appeared first on WeLiveSecurity
We Live Security

Microsoft warns of two Windows zero‑day flaws

Updates for the critical-rated vulnerabilities, which are being actively exploited in the wild, are still weeks away The post Microsoft warns of two Windows zero‑day flaws appeared first on WeLiveSecurity
We Live Security

The good, the bad and the plain ugly

A prolific ransomware gang vows to dial back its campaigns and spare healthcare organizations altogether during the COVID-19 crisis. It’s no cause for celebration. The post The good, the bad and the plain ugly appeared first on WeLiveSecurity
We Live Security

Week in security with Tony Anscombe

How to transition to a remote workforce in a safe manner – How to protect yourself from COVID-19 scams – Stantinko's miner caught using new obfuscation techniques The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
We Live Security

Keep calm and carry on working (remotely)

How can employees stay motivated and productive while teleworking during the COVID-19 crisis? The post Keep calm and carry on working (remotely) appeared first on WeLiveSecurity
We Live Security

What to do if your Twitter account has been hacked

Losing access to your account can be stressful, but there are steps you can take to get it back – and to avoid getting hacked again The post What to do if your Twitter account has been hacked appeared first...
We Live Security

Security flaws found in popular password managers

Not all they’re cracked up to be? Several password vaults have been found to contain vulnerabilities, both new and previously disclosed but never patched, a study says The post Security flaws found in popular password managers appeared first on WeLiveSecurity
We Live Security

Work from home: Improve your security with MFA

Remote work can be much safer with the right cyber‑hygiene practices in place – multi‑factor authentication is one of them The post Work from home: Improve your security with MFA appeared first on WeLiveSecurity
We Live Security

Stantinko’s new cryptominer features unique obfuscation techniques

ESET researchers bring to light unique obfuscation techniques discovered in the course of analyzing a new cryptomining module distributed by the Stantinko group’s botnet The post Stantinko’s new cryptominer features unique obfuscation techniques appeared first on WeLiveSecurity

Palantir, The $20 Billion, Peter Thiel-Backed Big Data Giant, Is Providing A Coronavirus Monitoring Tool To The CDC

Palantir will help the Centers for Disease Control keep on top of ventilator and mask needs to treat coronavirus victims, sources say.

Defense Evasion Dominated 2019 Attack Tactics

Researchers mapped tactics and techniques to the MITRE ATT&CK framework to determine which were most popular last year.

Watering-Holes Target Asian Ethnic Victims with Flash Update Decoy

About 10 compromised websites employ a multi-stage, targeted effort to fingerprint and compromise victims.

OpenWRT is vulnerable to attacks that execute malicious code

Enlarge (credit: OpenWRT) For almost three years, OpenWRT—the open source operating system that powers home routers and other types of embedded systems—has been vulnerable to remote code-execution attacks because updates were delivered over an unencrypted channel and digital...
SC Magazine

Privacy in critical care after telehealth demands jump

As coughs and body aches drive anxious Americans to telemed services in record numbers, relieving the burden on medical facilities stressed to breaking with COVID-19 cases, the subsequent relaxation of privacy requirements puts them at risk of PHI compromises,...