Category: welivesecurity

UEFI Secure Boot: Not so secure
24
Mar
2025

UEFI Secure Boot: Not so secure

ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems…

Protecting corporate data from threat actors in 2025
24
Mar
2025

Protecting corporate data from threat actors in 2025

Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational…

Phil Muncaster
24
Mar
2025

Key trends and challenges ahead

Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance…

Phil Muncaster
24
Mar
2025

6 common online betting scams and how to avoid them

Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly…

Brian Greene: Until the end of time
24
Mar
2025

Brian Greene: Until the end of time

The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the…

How to deal with data poisoning
23
Mar
2025

How to deal with data poisoning

You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously…

This month in security with Tony Anscombe – January 2025 edition
23
Mar
2025

This month in security with Tony Anscombe – January 2025 edition

DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal…

How scammers are exploiting DeepSeek's sudden rise
23
Mar
2025

How scammers are exploiting DeepSeek’s sudden rise

As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the…

AI will eat all our energy, unless we make it tiny
23
Mar
2025

AI will eat all our energy, unless we make it tiny

Left unchecked, AI’s energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry…

Phil Muncaster
23
Mar
2025

How organizations can master vulnerability management

Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching 05 Feb…

Neil Lawrence: What makes us unique in the age of AI
23
Mar
2025

Neil Lawrence: What makes us unique in the age of AI

As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms…

How AI-driven identify fraud is causing havoc
23
Mar
2025

How AI-driven identify fraud is causing havoc

Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here’s how to fight…