We Live Security stories - Page 2
Organisations 'not doing enough' to prevent data breaches
Thu, 1st Dec 2016
#
breach prevention
#
cybersecurity
#
data breach
Up-to-date security systems, usable security, and awareness on how to deal with threats and social engineering are needed.
The odd, 8-year legacy of the Conficker worm
Tue, 22nd Nov 2016
#
malware
#
cybersecurity
#
microsoft
Conficker's legacy lingers eight years after it first emerged, infecting 11 million devices worldwide and costing up to USD $9 billion in cleanup.
Working in the cyber security industry
Wed, 16th Nov 2016
#
malware
#
cybersecurity
#
cyber criminal
Diving into cyber security careers, industry experts reveal the skills needed to fight cybercrime and the dynamic nature of this ever-evolving field.
10 gadgets every white hat hacker needs in their toolkit
Tue, 1st Nov 2016
#
semiconductors
#
cybersecurity
#
opinion
In the ever-evolving realm of cybersecurity, these 10 essential gadgets empower white hat hackers to uncover vulnerabilities and enhance defences.
Online safety tips for social media and IM fans
Mon, 17th Oct 2016
#
malware
#
cybersecurity
#
opinion
Stay safe online! As Cyber Security Month kicks off, learn key tips to protect your social media and messaging accounts.
Do you know how to steer away from online banking trouble?
Thu, 13th Oct 2016
#
fintech
#
opinion
#
banking
Checking your account balance, paying bills and managing your finances...nowadays, it is pretty normal to do all these things online.
How to handle multiple devices and passwords at once
Tue, 11th Oct 2016
#
cybersecurity
#
notebook
#
passwords
It seems that for every work device you use, you have a personal alternative. But this means having twice as many gadgets & security concerns.
How do you work out a country's level of cybersecurity?
Tue, 4th Oct 2016
#
cybersecurity
#
opinion
#
we live security
Initially developed in 2013, the GCI is engaged in a perpetual update process to determine the relevant aspects of the security of ITU member states.
Snowden: 4 big security and privacy assumptions he undermined
Tue, 20th Sep 2016
#
malware
#
cybersecurity
#
opinion
I want to discuss four significant security and privacy assumptions that Snowden's actions, and the resulting revelations, have undermined.
Business security: Securing your data weak points
Tue, 13th Sep 2016
#
cybersecurity
#
we live security
#
retail
So where do I start? There are core tenets that will end up being repeated but here a few essential points to consider.
How to give your social media security an important boost
Wed, 7th Sep 2016
#
cybersecurity
#
social media
#
opinion
Social media has become an important part of modern life - one that can cause serious headaches if you're sharing with a wider audience than intended.
Ransomware: To pay or not to pay, that is the question
Tue, 6th Sep 2016
#
malware
#
ransomware
#
cybersecurity
We sometimes hear of instances where organisations pay ransomware even though they do have backups because it's the cheaper option.
Nemucod is back and serving an ad-clicking backdoor instead of ransomware
Mon, 15th Aug 2016
#
malware
#
cybersecurity
#
trojan
The trojan downloader Nemucod is back with a new campaign. This time, it has changed the payload served to its victims – it's not ransomware.
Firefighting, security and compliance - are they separate issues?
Thu, 4th Aug 2016
#
cybersecurity
#
cloud services
#
opinion
Sometimes a critical issue like a virus outbreak or a major systems malfunction, sometimes something as urgent as a VSIP.
Ransomware: First files … now complete devices
Mon, 11th Jul 2016
#
malware
#
ransomware
#
cybersecurity
Recently, a particular type of malware, has become increasingly troublesome for both businesses and home users. It is is known as ransomware.
Types of VPN networks and how they work: Do you know which kind to use?
Mon, 11th Jul 2016
#
malware
#
vpns
#
wireless networks
No doubt you are already aware of the importance of using VPN networks to guarantee the privacy of your information.
Malicious scripts in compromised websites - and how to protect yourself
Tue, 5th Jul 2016
#
malware
#
cybersecurity
#
opinion
People often highlight those threats that are more or less predictable, but the most dangerous are scripts that are hard for users to detect.
10 tips for staying cyber-safe when on the road
Tue, 5th Jul 2016
#
malware
#
cybersecurity
#
opinion
Here is a short guide that we have refreshed to help you travel safely and keep all your data and devices protected.
The 5 most common reasons for corporate data loss
Mon, 27th Jun 2016
#
dlp
#
opinion
#
we live security
There is no doubt that one of the main assets of a company is the data it stores. It should be adequately protected & available when needed.
Quantum Computation: A cryptography armageddon?
Mon, 20th Jun 2016
#
malware
#
quantum computing
#
cybersecurity
Cryptography is at risk of being broken by quantum computers, but post-quantum cryptography offers solutions. #PQCrypto #QuantumComputing.