Editor

Editor


WeLiveSecurity Content Team


551 articles by Editor

Ukraine Crisis – Digital Security Resource Center

The security review: ESET’s trends for 2016, more attacks in Ukraine and virtualized security

The security review: ESET’s trends for 2016, more attacks in Ukraine and virtualized security

Ukraine Crisis – Digital Security Resource Center

The security review: ESET’s trends for 2016, more attacks in Ukraine and virtualized security

Highlights from the last seven days in information security include ESET’s latest trends report (In)security Everywhere and the ongoing cyberattacks against Ukraine’s electric power industry.

Editor25 Jan 20163 min. read


The security review: BlackEnergy, Internet Explorer and Fitbit

The security review: BlackEnergy, Internet Explorer and Fitbit

The security review: BlackEnergy, Internet Explorer and Fitbit

Highlights from the past seven days in information security include an analysis of the BlackEnergy trojan and Microsoft’s decision to end support for older versions of Internet Explorer.

Editor18 Jan 20163 min. read


Less Technical

BlackEnergy and the Ukrainian power outage: What we really know

BlackEnergy and the Ukrainian power outage: What we really know

Less Technical

BlackEnergy and the Ukrainian power outage: What we really know

Robert Lipovsky, a senior malware researcher at ESET, offers his expert insight into the recent discovery of BlackEnergy malware in Ukrainian energy distribution companies.

Editor11 Jan 20165 min. read


The security review: BlackEnergy, CES 2016 and Windows 10

The security review: BlackEnergy, CES 2016 and Windows 10

The security review: BlackEnergy, CES 2016 and Windows 10

Highlights from the last seven days in information security include the return of the BlackEnergy trojan and security insights from CES 2016.

Editor11 Jan 20162 min. read


Less Technical

5 of the most devastating data breaches of 2015

5 of the most devastating data breaches of 2015

Less Technical

5 of the most devastating data breaches of 2015

Data breaches got bigger, brasher and more devastating in 2015. In this feature, we look at how some of the biggest came about and the impact they had.

Editor07 Jan 20164 min. read


Less Technical

5 things you need to know about social engineering

5 things you need to know about social engineering

Less Technical

5 things you need to know about social engineering

Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. However, little is known about this tactic. This feature discusses some key aspects.

Editor30 Dec 20154 min. read


Ransomware rearing its ugly head, goes after business

Ransomware rearing its ugly head, goes after business

Ransomware rearing its ugly head, goes after business

Ransomware is the latest tool in the cybercriminal’s arsenal, but it has to date largely been used to target consumers. Could it now be used to hit banks and other financial institutions too?

Editor28 Dec 20154 min. read


Less Technical

Why online gaming is the new frontier for cybercrime

Why online gaming is the new frontier for cybercrime

Less Technical

Why online gaming is the new frontier for cybercrime

Online gaming and cybercrime are more connected than you might think. We explore how online games are becoming the new hunting ground for cybercriminals looking to earn and learn.

Editor24 Dec 20154 min. read


The security review: Nemucod malware, Star Wars and China on cyber sovereignty

The security review: Nemucod malware, Star Wars and China on cyber sovereignty

The security review: Nemucod malware, Star Wars and China on cyber sovereignty

Our latest recap of the last seven days in information security includes the spread of the Nemucod trojan, the importance of improving awareness of online safety in children and young people and how Star Wars offers plenty of top cyber advice.

Editor21 Dec 20153 min. read