Loading...

Follow We Live Security on Feedspot

Continue with Google
Continue with Facebook
or

Valid

While the number of victims is lower than previously thought, the data accessed for millions of them is more sensitive than originally believed

The post Facebook downgrades victim count, details data accessed in breach appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Proper preparation can make all the difference when it comes to speaking at conferences

The post The Occasional Orator Part 3 appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The times they are a-changin‘, so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution?

The post Tips for minding the digital skills gap appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

TeleBots: First evidence linking Industroyer to NotPetya

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven

The post New TeleBots backdoor: First evidence linking Industroyer to NotPetya appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

As another confusing message spreads, we look at Facebook privacy, cloning, and hacking

The post Send in the clones: Facebook cloning revisited appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets

The post California outlaws poor default passwords in connected devices appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Google has found no evidence of misuse of user information courtesy of a security glitch in the social platform’s API

The post Google+ to shut down due to lack of adoption and privacy bug appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A closer look at the technology that is rapidly growing in popularity

The post Blockchain: What is it, how it works and how it is being used in the market appeared first on WeLiveSecurity

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

If you own a Wi-Fi router, it may well be riddled with security holes that expose you to a host of threats

The post Most routers full of firmware flaws that leave users at risk appeared first on WeLiveSecurity

Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview