Category: welivesecurity
From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it’s a wrap on…
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how…
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to…
One of the terms I’m most often asked to explain is what a “zero day” vulnerability or exploit is; let’s…
Facebook has officially launched ThreatExchange – a collaborative social network where companies can share information on cybersecurity threats, in an…
With Valentine’s Day nearly upon us, millions will be looking for love online. Here’s six online dating scams to look…
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context….
A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been…
Jamie Oliver’s website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC….
Lenovo’s installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now…
A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known…
The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police. 26…


