Tips & advice


3182 articles

Scams

Send in the clones: Facebook cloning revisited

Send in the clones: Facebook cloning revisited

Scams

Send in the clones: Facebook cloning revisited

As another confusing message spreads, we look at Facebook privacy, cloning, and hacking

David Harley11 Oct 2018


Internet of Things

California outlaws poor default passwords in connected devices

California outlaws poor default passwords in connected devices

Internet of Things

California outlaws poor default passwords in connected devices

The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets

Tomáš Foltýn10 Oct 2018


Privacy

Blockchain: What is it, how it works and how it is being used in the market

Blockchain: What is it, how it works and how it is being used in the market

Privacy

Blockchain: What is it, how it works and how it is being used in the market

A closer look at the technology that is rapidly growing in popularity

Cecilia Pastorino09 Oct 2018


Cybercrime

Why ask the public about cybercrime and cybersecurity?

Why ask the public about cybercrime and cybersecurity?

Cybercrime

Why ask the public about cybercrime and cybersecurity?

Answers could help raise awareness of situations that people fear

Stephen Cobb04 Oct 2018


Digital Security

Why keeping your cyber-wits about you matters

Why keeping your cyber-wits about you matters

Digital Security

Why keeping your cyber-wits about you matters

WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign’s goals

Tomáš Foltýn02 Oct 2018


Internet of Things

Top tips for protecting your Smart TV

Top tips for protecting your Smart TV

Internet of Things

Top tips for protecting your Smart TV

The final few months of 2018 will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks

Gabrielle Ladouceur Despins01 Oct 2018


Digital Security

Defending your company from cyberattack

Defending your company from cyberattack

Digital Security

Defending your company from cyberattack

ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk

Tomáš Foltýn26 Sep 2018


How To

How to improve hiring practices in cybersecurity

How to improve hiring practices in cybersecurity

How To

How to improve hiring practices in cybersecurity

Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry?

Lysa Myers25 Sep 2018


Cybercrime

Attackers crack Newegg’s defenses, slurp customers’ credit card data

Attackers crack Newegg’s defenses, slurp customers’ credit card data

Cybercrime

Attackers crack Newegg’s defenses, slurp customers’ credit card data

The skimmer, injected into the store’s payment page, harvested credit-card details from the store’s online customers for more than a month

Tomáš Foltýn21 Sep 2018