welivesecurity stories - Page 2
10 gadgets every white hat hacker needs in their toolkit
Sometimes, during security audits, we may encounter a situation where everything is being managed correctly.
Online safety tips for social media and IM fans
Nowadays, social networks, online videos and instant messaging are core to users’ online experience.
Do you know how to steer away from online banking trouble?
Checking your account balance, paying bills and managing your finances...nowadays, it is pretty normal to do all these things online.
How to handle multiple devices and passwords at once
It seems that for every work device you use, you have a personal alternative. But this means having twice as many gadgets & security concerns.
How do you work out a country’s level of cybersecurity?
Initially developed in 2013, the GCI is engaged in a perpetual update process to determine the relevant aspects of the security of ITU member states.
Snowden: 4 big security and privacy assumptions he undermined
I want to discuss four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.
Business security: Securing your data weak points
So where do I start? There are core tenets that will end up being repeated but here a few essential points to consider.
How to give your social media security an important boost
Social media has become an important part of modern life - one that can cause serious headaches if you’re sharing with a wider audience than intended.
Ransomware: To pay or not to pay, that is the question
We sometimes hear of instances where organisations pay ransomware even though they do have backups because it’s the cheaper option.
Nemucod is back and serving an ad-clicking backdoor instead of ransomware
The trojan downloader Nemucod is back with a new campaign. This time, it has changed the payload served to its victims – it's not ransomware.
Firefighting, security and compliance - are they separate issues?
Sometimes a critical issue like a virus outbreak or a major systems malfunction, sometimes something as urgent as a VSIP
Types of VPN networks and how they work: Do you know which kind to use?
No doubt you are already aware of the importance of using VPN networks to guarantee the privacy of your information
Ransomware: First files … now complete devices
Recently, a particular type of malware, has become increasingly troublesome for both businesses and home users. It is is known as ransomware.
Malicious scripts in compromised websites - and how to protect yourself
People often highlight those threats that are more or less predictable, but the most dangerous are scripts that are hard for users to detect.
10 tips for staying cyber-safe when on the road
Here is a short guide that we have refreshed to help you travel safely and keep all your data and devices protected.
The 5 most common reasons for corporate data loss
There is no doubt that one of the main assets of a company is the data it stores. It should be adequately protected & available when needed.
Quantum Computation: A cryptography armageddon?
A fairly surprising statement: all major cryptographic algorithms in use today are (virtually) broken!
Most organisations unconfident in ability to protect data after breach
The majority of IT professionals say they are not confident in their ability to keep their organization’s data secure following a breach.
Adobe warns of Flash zero-day vulnerability, being actively exploited by online criminals
As I write this, if you’re running Adobe Flash on your Windows, Mac, Linux or Chrome OS computer you’re potentially at risk.