Thursday, May 24, 2018
Open source code is ubiquitous and so are many vulnerabilities

Open source code is ubiquitous and so are many vulnerabilities

One-third of audited codebases that contain Apache Struts suffer from the same vulnerability that facilitated the Equifax hack a year ago The post Open source code is ubiquitous and so are many vulnerabilities appeared first on WeLiveSecurity
Suspected member of The Dark Overlord arrested in Serbia

Suspected member of The Dark Overlord arrested in Serbia

The Dark Overlord, known for a number of breaches and cyber-extortion campaigns in the last two years, is believed to have made US$275,000 from various schemes The post Suspected member of The Dark Overlord arrested in Serbia appeared first on WeLiveSecurity
Google to require Android device-makers to roll out OS security patches regularly

Google to require Android device-makers to roll out OS security patches...

The move is intended to help address the mobile platform’s perennial problem – that many manufacturers of Android-powered devices are slow to get software updates out the door The post Google to require Android device-makers to roll out OS security patches regularly appeared first on WeLiveSecurity
Researchers reveal flaws that may expose encrypted emails to prying eyes

Researchers reveal flaws that may expose encrypted emails to prying eyes

A team of academics says that, if exploited, the vulnerabilities can reveal the plain text of encrypted emails, including those sent years ago The post Researchers reveal flaws that may expose encrypted emails to prying eyes appeared first on WeLiveSecurity
WannaCryptor: The curious tale of a ravenous cryptoworm

WannaCryptor: The curious tale of a ravenous cryptoworm

Do you still remember how WannaCryptor ran its – winding – course? It was a tale that revealed a number of intriguing plot lines amid the ransomworm’s numerous twists and turns. The post WannaCryptor: The curious tale of a ravenous cryptoworm appeared first on WeLiveSecurity
Fake or not fake – that is the question

Fake or not fake – that is the question

An interview with ESET’s Lukáš Štefanko on the thin line between what deserves the name “security app” and what can be called fake. The post Fake or not fake – that is the question appeared first on WeLiveSecurity
12 months on, what are the lessons learned from WannaCryptor?

12 months on, what are the lessons learned from WannaCryptor?

Time does fly! It feels like only yesterday that a new strain of hitherto little-known malware achieved celebrity status among global ransomware campaigns The post 12 months on, what are the lessons learned from WannaCryptor? appeared first on WeLiveSecurity
Are firms and regulators prepared for GDPR?

Are firms and regulators prepared for GDPR?

The answer may hinge on if you're a glass-half-full or glass-half-empty kind of person. While we’re at it, how about regulators’ level of preparedness, anyway? The post Are firms and regulators prepared for GDPR? appeared first on WeLiveSecurity
One year later: EternalBlue exploit more popular now than during WannaCryptor outbreak

One year later: EternalBlue exploit more popular now than during WannaCryptor...

The infamous outbreak may no longer be causing mayhem worldwide but the threat that enabled it is still very much alive and posing a major threat to unpatched and unprotected systems The post One year later: EternalBlue exploit more popular now than during WannaCryptor outbreak appeared first on WeLiveSecurity
Inside fake Interac transfer and tax refund SMS phishing

Inside fake Interac transfer and tax refund SMS phishing

It’s tax season in Canada and scammers are using fake tax refund forms to lure victims into supplying their personal information via phishing pages The post Inside fake Interac transfer and tax refund SMS phishing appeared first on WeLiveSecurity

Recent Posts