Thursday, May 24, 2018
WeLiveSecurity in running for European Security Blogger Awards. Vote now!

WeLiveSecurity in running for European Security Blogger Awards. Vote now!

We’re not in it for prizes (or cakes), but there’s no denying that we’re thrilled to be a finalist for the European Security Blogger Awards – and in five categories at that! The post WeLiveSecurity in running for European Security Blogger Awards. Vote now! appeared first on WeLiveSecurity
VPNFilter – is a malware timebomb lurking on your router?

VPNFilter – is a malware timebomb lurking on your router?

A Cisco paper reports on zombie malware that has apparently infected more than 500,000 home routers.
BrandPost: Understanding Configuration Drift in the Cloud

BrandPost: Understanding Configuration Drift in the Cloud

What is configuration drift? Configuration drift occurs when changes are made to an environment over time. It happens as new software is installed, settings are modified, and other changes are made to systems. When configuration drift occurs, environments that were once hardened may become vulnerable to exploitation by cyber criminals.Configuration drift can happen both in…
New Variants Found in Spectre and Meltdown

New Variants Found in Spectre and Meltdown

New Variants Found in Spectre and MeltdownTwo new variants of the Meltdown and Spectre vulnerabilities that can allow an attacker to gain access to sensitive information have been disclosed, according to a 21 May US-CERT alert. Google and Microsoft announced that the new variants, 3a and 4, known respectively as Meltdown and Spectre, affect the central…
Intel Responds to Spectre-Like Flaw In CPUs

Intel Responds to Spectre-Like Flaw In CPUs

Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative execution side channel flaw that could allow attackers to access information.
TeenSafe phone monitoring app leaks teens’ iCloud logins in plaintext

TeenSafe phone monitoring app leaks teens’ iCloud logins in plaintext

The "secure" monitoring app is used by over a million parents.
Mobile Giants: Please Don’t Share the Where

Mobile Giants: Please Don’t Share the Where

Your mobile phone is giving away your approximate location all day long. This isn’t exactly a secret: It has to share this data with your mobile provider constantly to provide better call quality and to route any emergency 911 calls straight to your location. But now, the major mobile providers in the United States —…
Why You Need To Know About “Cryptojacking”

Why You Need To Know About “Cryptojacking”

As the value and quantity of digital currencies have rocketed, so too have the risks. In fact, crypto-related malware has spiked over the last year, breaking the top 10 most commonly found malware families. Some attacks are designed to steal the currency outright, by robbing digital wallets, but the majority of threats come in the…
Turla Mosquito: A shift towards more generic tools

Turla Mosquito: A shift towards more generic tools

ESET researchers have observed a significant change in the campaign of the infamous espionage group The post Turla Mosquito: A shift towards more generic tools appeared first on WeLiveSecurity
Server? What server? Site forgotten for 12 years attracts hacks, fines

Server? What server? Site forgotten for 12 years attracts hacks, fines

The University of Greenwich might not have noticed the website but hackers did.

Recent Posts