We Live Security stories

Botnets are being overshadowed by ransomware - in the media, at least
Mon, 12th Jun 2017
#
malware
#
ddos
#
ransomware
Botnets not only harm the owners of infected computers, but others too – they can send out spam, distributing a range of scams or even ransomware.

The three types of employees that can cause a data breach
Mon, 29th May 2017
#
malware
#
edutech
#
breach prevention
More and more companies are realizing that trusted & trained employees can also pose an enormous threat. We have identified three types of employees.

A short history of the computer password
Mon, 15th May 2017
#
malware
#
cybersecurity
#
passwords
The concept of a password was developed so that users could only access their own specific files for their allotted four hours a week.

Fingerprint security & biometrics: Three major myths busted
Mon, 8th May 2017
#
malware
#
biometrics
#
cybersecurity
Contrary to what many people assume biometric readers aren't foolproof. They have their own set of unique vulnerabilities. Fingerprints can be stolen.

Young cybercriminals ‘more motivated by peer respect than financial gain’
Thu, 27th Apr 2017
#
malware
#
ddos
#
cybersecurity
An increasing number of young cybercriminals are motivated by a sense of notoriety and popularity with their peers rather than financial gain.

Women in cybersecurity: Slowly but surely, change is coming
Mon, 24th Apr 2017
#
malware
#
dei
#
cybersecurity
Strides in diversity: Women are breaking barriers in cybersecurity, shifting the industry's gender dynamic for the better.

It’s time to finally say goodbye to Windows XP. And Vista. Again.
Mon, 10th Apr 2017
#
malware
#
cybersecurity
#
microsoft
On April 8 it was three years since Microsoft ended its extended support for Windows XP. 8% of desktop users worldwide still run the operating system.

Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play
Wed, 5th Apr 2017
#
smartphones
#
malware
#
martech
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.

The economics of cybersecurity for the undecided
Mon, 27th Mar 2017
#
malware
#
ddos
#
phishing
It is precisely because of this concept of the cost of doing nothing that we’re able to determine the value of a cybersecurity solution.

Here are the top trends in Android ransomware right now
Tue, 14th Mar 2017
#
smartphones
#
malware
#
ransomware
Android devices are used to store increasing amounts of valuable data, making Android ransomware ever more worthwhile for attackers.

Welivesecurity reports new crypto-ransomware hitting macOS
Mon, 13th Mar 2017
#
malware
#
ransomware
#
cybersecurity
Crypto-ransomware campaign for Mac targets users with fake patcher applications distributed via BitTorrent sites.

10 reasons why cybercriminals target smartphones
Mon, 6th Mar 2017
#
smartphones
#
malware
#
cybersecurity
Smartphones aim to heighten convenience, but there is a real feeling that they're becoming a bigger target for cybercriminals. Why?.

DNS attacks: How they try to direct you to fake pages
Thu, 2nd Mar 2017
#
malware
#
cybersecurity
#
dns attacks
that there is more than one type of attack that can affect DNS servers—and in this article we will look at the differences between them.

Released Android malware source code used to run a banking botnet
Mon, 27th Feb 2017
#
smartphones
#
malware
#
cybersecurity
The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks.

Welivesecurity reveals the eight things you should know about spyware
Tue, 21st Feb 2017
#
malware
#
cybersecurity
#
spyware
Spyware is widely spread across the web, and is ever present on today’s mobile and desktop devices. You should be security-conscious at all times.

An in-depth look at next-gen security software: Myths and marketing
Tue, 14th Feb 2017
#
cybersecurity
#
virus
#
analyst report
When next-gen vendors talk about behavioural analysis as their exclusive discovery, they’re at best misinformed.

Entrust your cyber security secrets to a safe pair of hands
Fri, 10th Feb 2017
#
malware
#
cybersecurity
#
we live security
Imagine, if you will, that your security is flawless, and not a single other person can access your sensitive accounts or information.

Ransomware: Key insights from infosec experts
Tue, 7th Feb 2017
#
malware
#
ransomware
#
cybersecurity
Take ransomware. What does it entail? Does it even matter – will it ever actually affect you? It’ll vanish as quickly as it appeared, right? Wrong.

RoT: The all-powerful Ransomware of Things
Tue, 31st Jan 2017
#
malware
#
ddos
#
ransomware
Infected IoT devices may extort commercial websites by threatening a DDoS attack, or locking IoT devices in order to charge a ransom aka Jackware.

Beware! New WhatsApp scam offering “free internet without Wi-Fi”
Mon, 16th Jan 2017
#
email security
#
wireless networks
#
cybersecurity
WhatsApp keeps on increasing, with deceptive campaigns coming up with with novel ways of luring in victims. Today we will show you a new example.