Latest Articles

Privacy

Blockchain: What is it, how it works and how it is being used in the market

Blockchain: What is it, how it works and how it is being used in the market

Privacy

Blockchain: What is it, how it works and how it is being used in the market

A closer look at the technology that is rapidly growing in popularity

Cecilia Pastorino09 Oct 2018


Most routers full of firmware flaws that leave users at risk

Most routers full of firmware flaws that leave users at risk

Most routers full of firmware flaws that leave users at risk

If you own a Wi-Fi router, it may well be riddled with security holes that expose you to a host of threats

Tomáš Foltýn08 Oct 2018


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Facebook stolen access tokens issue rumbles on - Week in security with Tony Anscombe

Shane Curtis07 Oct 2018


Virus Bulletin 2018: Supply chain hacking grows up

Virus Bulletin 2018: Supply chain hacking grows up

Virus Bulletin 2018: Supply chain hacking grows up

Striking the balance between supply, demand and safety is a major concern

Cameron Camp05 Oct 2018


Make it a cyber-habit: Five simple steps to staying safe online

Make it a cyber-habit: Five simple steps to staying safe online

Make it a cyber-habit: Five simple steps to staying safe online

What are some essential steps you can take to increase your online safety – now and in the long run?

Tomáš Foltýn05 Oct 2018


Cybercrime

Why ask the public about cybercrime and cybersecurity?

Why ask the public about cybercrime and cybersecurity?

Cybercrime

Why ask the public about cybercrime and cybersecurity?

Answers could help raise awareness of situations that people fear

Stephen Cobb04 Oct 2018


Virus Bulletin 2018: Attack velocity ramps up

Virus Bulletin 2018: Attack velocity ramps up

Virus Bulletin 2018: Attack velocity ramps up

Some tips from the floor of VB 2018 for helping to keep your data more secure

Cameron Camp04 Oct 2018


Facebook: No evidence attackers used stolen access tokens on third-party sites

Facebook: No evidence attackers used stolen access tokens on third-party sites

Facebook: No evidence attackers used stolen access tokens on third-party sites

The social networking behemoth is expected to face a formal investigation by Ireland’s Data Protection Commission in what could be the “acid test” of GDPR since the law took effect in May

Tomáš Foltýn03 Oct 2018


Secure Coding

IT forensic tools: How to find the right one for each incident

IT forensic tools: How to find the right one for each incident

Secure Coding

IT forensic tools: How to find the right one for each incident

Some online resources that will help you find the most suitable IT forensic tools for each case

Lucas Paus03 Oct 2018


Digital Security

Why keeping your cyber-wits about you matters

Why keeping your cyber-wits about you matters

Digital Security

Why keeping your cyber-wits about you matters

WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals

Tomáš Foltýn02 Oct 2018


50 million Facebook users affected in breach

50 million Facebook users affected in breach

50 million Facebook users affected in breach

It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps

Tomáš Foltýn01 Oct 2018


Internet of Things

Top tips for protecting your Smart TV

Top tips for protecting your Smart TV

Internet of Things

Top tips for protecting your Smart TV

The final few months of 2018 will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks

Gabrielle Ladouceur Despins01 Oct 2018


Apt Activity Report
MDR Protection