HotPage: Story of a signed, vulnerable, ad-injecting driver
WeLiveSecurity
by
1h ago
A study of a sophisticated Chinese browser injector that leaves more doors open ..read more
Visit website
Small but mighty: Top 5 pocket-sized gadgets to boost your ethical hacking skills
WeLiveSecurity
by
1d ago
These five formidable bits of kit that can assist cyber-defenders in spotting chinks in corporate armors and help hobbyist hackers deepen their understanding of cybersecurity ..read more
Visit website
Hello, is it me you’re looking for? How scammers get your phone number
WeLiveSecurity
by
3d ago
Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters ..read more
Visit website
Should ransomware payments be banned? – Week in security with Tony Anscombe
WeLiveSecurity
by
6d ago
The issue of whether to ban ransomware payments is a hotly debated topic in cybersecurity and policy circles. What are the implications of outlawing these payments, and would the ban be effective ..read more
Visit website
Understanding IoT security risks and how to mitigate them | Cybersecurity podcast
WeLiveSecurity
by
1w ago
As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds ..read more
Visit website
5 common Ticketmaster scams: How fraudsters steal the show
WeLiveSecurity
by
1w ago
Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account ..read more
Visit website
Social media and teen mental health – Week in security with Tony Anscombe
WeLiveSecurity
by
1w ago
Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick ..read more
Visit website
No room for error: Don’t get stung by these common Booking.com scams
WeLiveSecurity
by
2w ago
From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation ..read more
Visit website
AI in the workplace: The good, the bad, and the algorithmic
WeLiveSecurity
by
2w ago
While AI can liberate us from tedious tasks and even eliminate human error, it's crucial to remember its weaknesses and the unique capabilities that humans bring to the table ..read more
Visit website
Hijacked: How hacked YouTube channels spread scams and malware
WeLiveSecurity
by
2w ago
Here’s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform ..read more
Visit website

Follow WeLiveSecurity on FeedSpot

Continue with Google
Continue with Apple
OR