Category: welivesecurity

Alan Martin
10
Apr
2025

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC…

Alan Martin
10
Apr
2025

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites…

Sabrina Pagnotta
10
Apr
2025

There are still only a handful of women in the security field

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke…

Graham Cluley
10
Apr
2025

DDoS attack on feminist blog backfires on International Women’s Day

An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile. 09…

Alan Martin
10
Apr
2025

FBI investigating apparent ISIS attacks on Western websites

A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator….

Marc-Etienne M.Léveillé
09
Apr
2025

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware. Marc-Etienne M.Léveillé 09 Mar 2015  • …

David Harley
09
Apr
2025

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity. 10…

Kyle Ellison
09
Apr
2025

Hackers phish for data in Apple Watch scam

Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers…

Aryeh Goretsky
09
Apr
2025

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating…

Camilo Gutiérrez Amaya
09
Apr
2025

7 tasks that waste your IT team’s time

IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things…

How regulatory standards and cyber insurance inform each other
28
Mar
2025

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some…

Editor
28
Mar
2025

PWA phishing on Android and iOS – Week in security with Tony Anscombe

Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security 23 Aug…