Category: welivesecurity

Tony Anscombe
28
Mar
2025

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices 01 Oct 2024…

Why system resilience should mainly be the job of the OS, not just third-party applications
28
Mar
2025

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience 01 Oct 2024  •  , 4 min. read Last week, a US…

Editor
28
Mar
2025

The complexities of cyberattack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this…

Tony Anscombe
28
Mar
2025

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility? 08…

Editor
28
Mar
2025

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental…

Here’s how to slam on the brakes
28
Mar
2025

Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details 15 Oct…

Editor
27
Mar
2025

Guarding against grooming | Unlocked 403 cybersecurity podcast (ep. 7)

“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a…

Editor
27
Mar
2025

Threat actors exploit zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from…

What are they and how do I avoid them?
27
Mar
2025

What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone…

ESET Research
27
Mar
2025

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various…

Tony Fadell: Innovating to save our planets
27
Mar
2025

Tony Fadell: Innovating to save our planets

As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the…

Phil Muncaster
27
Mar
2025

Defending your personal data from dark web criminals

You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take…