Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-10-19 09:30:11 |
Don\'t get scammed when buying tickets online (lien direct) |
>With hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force
|
|
|
|
|
2022-10-17 09:30:42 |
5 steps to protect your school from cyberattacks (lien direct) |
>What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay?
|
|
|
|
|
2022-10-14 10:00:26 |
ESET research into POLONIUM\'s arsenal – Week in security with Tony Anscombe (lien direct) |
More than a dozen organizations operating in various verticals were attacked by the threat actor
|
Threat
|
|
|
|
2022-10-13 09:30:58 |
Life in pursuit of answers: In the words of Ada Yonath (lien direct) |
From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell.
|
|
|
|
|
2022-10-12 09:30:50 |
How scammers target Zelle users – and how you can stay safe (lien direct) |
>Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here's how to keep your money safe while using the popular P2P payment service.
|
|
|
|
|
2022-10-11 09:30:08 |
POLONIUM targets Israel with Creepy malware (lien direct) |
>ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group
|
Malware
|
|
★★★
|
|
2022-10-10 09:30:02 |
Steam account stolen? Here\'s how to get it back (lien direct) |
>Has your Steam account been hacked? Here are the signs to look for and what you can do to get your account back.
|
|
|
|
|
2022-10-07 14:15:41 |
Key takeaways from ESET Threat Report T2 2022 – Week in security with Tony Anscombe (lien direct) |
A look back on the key trends and developments that shaped the cyberthreat landscape from May to August of this year
|
Threat
|
|
|
|
2022-10-06 09:30:49 |
The need to change cybersecurity for the next generation (lien direct) |
>Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits
|
|
|
|
|
2022-10-05 09:30:10 |
(Déjà vu) ESET Threat Report T2 2022 (lien direct) |
>A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
|
Threat
|
|
★★★
|
|
2022-10-03 09:30:31 |
8 questions to ask yourself before getting a home security camera (lien direct) |
>As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?
|
|
|
|
|
2022-09-30 14:10:38 |
ESET Research into new attacks by Lazarus – Week in security with Tony Anscombe (lien direct) |
The attack involved the first recorded abuse of a security vulnerability in a Dell driver that was patched in May 2021
|
Vulnerability
|
APT 38
|
|
|
2022-09-30 10:00:12 |
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium (lien direct) |
ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers
|
|
APT 38
|
|
|
2022-09-28 09:30:48 |
Protecting teens from sextortion: What parents should know (lien direct) |
>Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online
|
|
|
|
|
2022-09-26 09:30:01 |
What happens with a hacked Instagram account – and how to recover it (lien direct) |
>Had your Instagram account stolen? Don't panic – here's how to get your account back and how to avoid getting hacked (again)
|
|
|
|
|
2022-09-23 19:20:16 |
What to consider before disposing of personal data – Week in security with Tony Anscombe (lien direct) |
A major financial services company has learned the hard way about the importance of proper disposal of customers' personal data
|
|
|
|
|
2022-09-23 09:30:06 |
5 tips to help children navigate the internet safely (lien direct) |
>The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits?
|
|
|
|
|
2022-09-22 09:30:31 |
Hey WeLiveSecurity, how does biometric authentication work? (lien direct) |
>Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What's the good and the bad of using biometric traits for authentication?
|
|
|
|
|
2022-09-19 09:30:47 |
Can your iPhone be hacked? What to know about iOS security (lien direct) |
>Here are some of the most common ways that an iPhone can be compromised with malware, how to tell it's happened to you, and how to remove a hacker from your device
|
|
|
|
|
2022-09-16 14:45:01 |
Rising to the challenges of secure coding – Week in security with Tony Anscombe (lien direct) |
>The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products
|
|
|
|
|
2022-09-15 09:30:50 |
Third‑party cookies: How they work and how to stop them from tracking you across the web (lien direct) |
Cross-site tracking cookies have a bleak future but can still cause privacy woes to unwary users
|
|
|
|
|
2022-09-15 07:30:04 |
SparklingGoblin deploys new Linux backdoor – Week in security, special edition (lien direct) |
>ESET Research first spotted this variant of the SideWalk backdoor in the network of a Hong Kong university in February 2021
|
|
|
|
|
2022-09-14 09:30:58 |
You never walk alone: The SideWalk backdoor gets a Linux variant (lien direct) |
>ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor
|
Tool
|
|
|
|
2022-09-13 09:30:25 |
Why is my Wi‑Fi slow and how do I make it faster? (lien direct) |
Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up.
|
|
|
|
|
2022-09-09 13:30:08 |
ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe (lien direct) |
>Worok takes aim at various high-profile organizations that operate in multiple sectors and are located primarily in Asia
|
|
|
|
|
2022-09-08 09:30:47 |
Toys behaving badly: How parents can protect their family from IoT threats (lien direct) |
It pays to do some research before taking a leap into the world of internet-connected toys
|
|
|
|
|
2022-09-07 09:30:18 |
RDP on the radar: An up‑close view of evolving remote access threats (lien direct) |
Misconfigured remote access services continue to give bad actors an easy access path to company networks – here's how you can minimize your exposure to attacks misusing Remote Desktop Protocol
|
|
|
|
|
2022-09-06 09:30:47 |
Worok: The big picture (lien direct) |
>Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files
|
|
|
|
|
2022-09-02 13:30:41 |
Will cyber‑insurance pay out? – Week in security with Tony Anscombe (lien direct) |
What if your organization is hit by a cyberattack that is attributed to a nation state? Would your insurance cover the costs of the attack?
|
|
|
|
|
2022-08-31 09:30:26 |
How to take control over your digital legacy (lien direct) |
>Do you have a plan for what will happen to your digital self when you pass away? Here's how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.
|
|
|
|
|
2022-08-30 09:30:56 |
TikShock: Don\'t get caught out by these 5 TikTok scams (lien direct) |
>Are you aware of the perils of the world's no. 1 social media? Do you know how to avoid scams and stay safe on TikTok?
|
|
|
|
|
2022-08-26 15:00:19 |
French hospital crippled by cyberattack – Week in security with Tony Anscombe (lien direct) |
>As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts
|
Ransomware
|
|
|
|
2022-08-25 09:30:46 |
What is doxing and how to protect yourself (lien direct) |
>Doxing can happen to anyone – here's how you can reduce the odds that your personal information will be weaponized against you
|
|
|
|
|
2022-08-23 09:30:21 |
Is your personal data all over the internet? 7 steps to cleaning up your online presence (lien direct) |
>You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps
|
|
|
|
|
2022-08-19 16:45:30 |
Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony Anscombe (lien direct) |
Zero-day vulnerabilities are super active and Google and Apple are acting to patch these vulnerabilities, some of which seen on-the-wild.
|
|
|
|
|
2022-08-18 09:30:14 |
A step‑by‑step guide to enjoy LinkedIn safely (lien direct) |
LinkedIn privacy settings are just as overwhelming as any other social media settings. There's a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.
|
|
|
★★
|
|
2022-08-16 12:30:26 |
DEF CON – “don\'t worry, the elections are safe” edition (lien direct) |
>Don't worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference.
|
|
|
|
|
2022-08-16 09:30:17 |
How a spoofed email passed the SPF check and landed in my inbox (lien direct) |
>The Sender Policy Framework can't help prevent spam and phishing if you allow billions of IP addresses to send as your domain
|
Spam
|
|
|
|
2022-08-15 10:30:01 |
Black Hat USA 2022: Burnout, a significant issue (lien direct) |
>The digital skills gap, especially in cybersecurity, is not a new phenomenon. This problematic is now exacerbate by the prevalence of burnout, which was presented at Black Hat USA 2022
|
|
|
|
|
2022-08-15 09:30:15 |
Black Hat – Windows isn\'t the only mass casualty platform anymore (lien direct) |
>Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars
|
|
|
|
|
2022-08-12 16:25:57 |
The potential consequences of data breach, and romance scams – Week in security with Tony Anscombe (lien direct) |
The NHS was victim of a potential cyberattack, which raises the question of the impact of those data breach for the public.
|
Data Breach
|
|
|
|
2022-08-12 12:30:47 |
Black Hat 2022‑ Cyberdefense in a global threats era (lien direct) |
Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind.
|
|
|
|
|
2022-08-12 09:30:45 |
Safety first: how to tweak the settings on your dating apps (lien direct) |
>Tinder, Bumble or Grindr - popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.
|
|
|
|
|
2022-08-11 16:00:48 |
An eighties classic – Zero Trust (lien direct) |
>A deep-dive in Zero-trust, to help you navigate in a zero-trust world and further secure your organization.
|
|
|
|
|
2022-08-09 09:30:28 |
How to check if your PC has been hacked, and what to do next (lien direct) |
>Has your PC been hacked? Whatever happens, don't panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.
|
|
|
★★★
|
|
2022-08-05 12:00:16 |
Develop a zero‑trust environment to protect your organization – Week in security with Tony Anscombe (lien direct) |
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.
|
|
|
|
|
2022-08-04 09:30:51 |
Don\'t get singed by scammers while you\'re carrying the torch for Tinder (lien direct) |
Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.
|
|
|
|
|
2022-08-02 09:30:31 |
Start as you mean to go on: the top 10 steps to securing your new computer (lien direct) |
>Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer's pc, learn the steps to protect your new PC from cyberthreats.
|
|
|
|
|
2022-07-29 17:45:39 |
Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe (lien direct) |
>Cybercriminals exploited a vulnerability to steal the equivalent of 18M$ from the NFT music streaming platform Audius, while other cyberthreats related to crypto makes the news.
|
Vulnerability
|
|
|
|
2022-07-29 09:30:53 |
Staying safe online: How to browse the web securely (lien direct) |
>Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.
|
|
|
|