We Live Security

bg
ESET APT Activity Report T3 2022

ESET APT Activity Report T3 2022

An overview of the activities of selected APT groups investigated and analyzed by...

bg
Mastodon vs. Twitter: Know the differences

Mastodon vs. Twitter: Know the differences

Looking for an alternative to Twitter and thinking about joining the folks flocking...

bg
5 valuable skills your children can learn by playing video games

5 valuable skills your children can learn by playing video...

Gaming can help your children build and sharpen a range of life skills that will...

bg
Top 10 Venmo scams: Don’t fall for these common tricks

Top 10 Venmo scams: Don’t fall for these common tricks

Here's what to know about some of the most common ploys that scammers use on the...

bg
Why your data is more valuable than you may realize

Why your data is more valuable than you may realize

The data trail you leave behind whenever you're online is bigger – and more revealing...

bg
Are you in control of your personal data? – Week in security with Tony Anscombe

Are you in control of your personal data? – Week in security...

Data Privacy Week is a reminder to protect your data – all year round. Here are...

bg
SwiftSlicer: New destructive wiper malware strikes Ukraine

SwiftSlicer: New destructive wiper malware strikes Ukraine

Sandworm continues to conduct attacks against carefully chosen targets in the war-torn...

bg
Hybrid play: Leveling the playing field in online video gaming and beyond

Hybrid play: Leveling the playing field in online video...

Does VALORANT’s approach to cheating signal a turning point in how we deal with...

bg
Ransomware payments down 40% in 2022 – Week in security with Tony Anscombe

Ransomware payments down 40% in 2022 – Week in security...

Ransomware revenue plunges to $456 million in 2022 as more victims refuse to pay...

bg
Tech support scammers are still at it: Here’s what to look out for in 2023

Tech support scammers are still at it: Here’s what to look...

Hello, is it me you’re looking for? Fraudsters still want to help you fix a computer...

bg
Top 10 Venmo scams – and how to stay safe

Top 10 Venmo scams – and how to stay safe

Don’t be the next victim – here's what to know about some of the most common tricks...

bg
Hybrid commerce: Blurring the lines between business and pleasure

Hybrid commerce: Blurring the lines between business and...

It is now acceptable to find a job on a dating app! The post Hybrid commerce: Blurring...

bg
APT group trojanizes Telegram app – Week in security with Tony Anscombe

APT group trojanizes Telegram app – Week in security with...

StrongPity's backdoor is fitted with various spying features and can record phone...

bg
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit

Introducing IPyIDA: A Python plugin for your reverse‑engineering...

ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter...

bg
Now you can legally repair your tech – sort of

Now you can legally repair your tech – sort of

A new law portends a future where (we hope) it will be easier for us all to repair,...

bg
StrongPity espionage campaign targeting Android users

StrongPity espionage campaign targeting Android users

ESET researchers identified an active StrongPity campaign distributing a trojanized...

bg
Cracked it! Highlights from KringleCon 5: Golden Rings

Cracked it! Highlights from KringleCon 5: Golden Rings

Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for...

bg
Hybrid work: Turning business platforms into preferred social spaces

Hybrid work: Turning business platforms into preferred...

Hybrid work and hybrid play now merge into hybrid living, but where is the line...

bg
Ransomware target list – Week in security with Tony Anscombe

Ransomware target list – Week in security with Tony Anscombe

Why schools, hospitals, local governments and other public sector organizations...

bg
The doctor will see you now … virtually: Tips for a safe telehealth visit

The doctor will see you now … virtually: Tips for a safe...

Are your virtual doctor visits private and secure? Here’s what to know about, and...

bg
Gaming: How much is too much for our children?

Gaming: How much is too much for our children?

With many children spending a little too much time playing video games, learn to...

bg
The world’s most common passwords: What to do if yours is on the list

The world’s most common passwords: What to do if yours...

Do you use any of these extremely popular – and eminently hackable – passwords?...

bg
Cybersecurity trends and challenges to look out for in 2023

Cybersecurity trends and challenges to look out for in...

What are some of the key cybersecurity trends and themes that organizations should...

bg
2022 in review: 10 of the year’s biggest cyberattacks

2022 in review: 10 of the year’s biggest cyberattacks

The past year has seen no shortage of disruptive cyberattacks – here’s a round-up...