We Live Security
ESET APT Activity Report T3 2022
An overview of the activities of selected APT groups investigated and analyzed by...
Mastodon vs. Twitter: Know the differences
Looking for an alternative to Twitter and thinking about joining the folks flocking...
5 valuable skills your children can learn by playing video...
Gaming can help your children build and sharpen a range of life skills that will...
Top 10 Venmo scams: Don’t fall for these common tricks
Here's what to know about some of the most common ploys that scammers use on the...
Why your data is more valuable than you may realize
The data trail you leave behind whenever you're online is bigger – and more revealing...
Are you in control of your personal data? – Week in security...
Data Privacy Week is a reminder to protect your data – all year round. Here are...
SwiftSlicer: New destructive wiper malware strikes Ukraine
Sandworm continues to conduct attacks against carefully chosen targets in the war-torn...
Hybrid play: Leveling the playing field in online video...
Does VALORANT’s approach to cheating signal a turning point in how we deal with...
Ransomware payments down 40% in 2022 – Week in security...
Ransomware revenue plunges to $456 million in 2022 as more victims refuse to pay...
Tech support scammers are still at it: Here’s what to look...
Hello, is it me you’re looking for? Fraudsters still want to help you fix a computer...
Top 10 Venmo scams – and how to stay safe
Don’t be the next victim – here's what to know about some of the most common tricks...
Hybrid commerce: Blurring the lines between business and...
It is now acceptable to find a job on a dating app! The post Hybrid commerce: Blurring...
APT group trojanizes Telegram app – Week in security with...
StrongPity's backdoor is fitted with various spying features and can record phone...
Introducing IPyIDA: A Python plugin for your reverse‑engineering...
ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter...
Now you can legally repair your tech – sort of
A new law portends a future where (we hope) it will be easier for us all to repair,...
StrongPity espionage campaign targeting Android users
ESET researchers identified an active StrongPity campaign distributing a trojanized...
Cracked it! Highlights from KringleCon 5: Golden Rings
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for...
Hybrid work: Turning business platforms into preferred...
Hybrid work and hybrid play now merge into hybrid living, but where is the line...
Ransomware target list – Week in security with Tony Anscombe
Why schools, hospitals, local governments and other public sector organizations...
The doctor will see you now … virtually: Tips for a safe...
Are your virtual doctor visits private and secure? Here’s what to know about, and...
Gaming: How much is too much for our children?
With many children spending a little too much time playing video games, learn to...
The world’s most common passwords: What to do if yours...
Do you use any of these extremely popular – and eminently hackable – passwords?...
Cybersecurity trends and challenges to look out for in...
What are some of the key cybersecurity trends and themes that organizations should...
2022 in review: 10 of the year’s biggest cyberattacks
The past year has seen no shortage of disruptive cyberattacks – here’s a round-up...