We Live Security stories - Page 2
Working in the cyber security industry
Diving into cyber security careers, industry experts reveal the skills needed to fight cybercrime and the dynamic nature of this ever-evolving field.
10 gadgets every white hat hacker needs in their toolkit
Essential hacker hardware: Top 10 must-have gadgets for ethical hacking pros unveiled.
Online safety tips for social media and IM fans
Stay safe online! As Cyber Security Month kicks off, learn key tips to protect your social media and messaging accounts.
Do you know how to steer away from online banking trouble?
Checking your account balance, paying bills and managing your finances...nowadays, it is pretty normal to do all these things online.
How to handle multiple devices and passwords at once
It seems that for every work device you use, you have a personal alternative. But this means having twice as many gadgets & security concerns.
How do you work out a country’s level of cybersecurity?
Initially developed in 2013, the GCI is engaged in a perpetual update process to determine the relevant aspects of the security of ITU member states.
Snowden: 4 big security and privacy assumptions he undermined
I want to discuss four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.
Business security: Securing your data weak points
So where do I start? There are core tenets that will end up being repeated but here a few essential points to consider.
How to give your social media security an important boost
Social media has become an important part of modern life - one that can cause serious headaches if you’re sharing with a wider audience than intended.
Ransomware: To pay or not to pay, that is the question
We sometimes hear of instances where organisations pay ransomware even though they do have backups because it’s the cheaper option.
Nemucod is back and serving an ad-clicking backdoor instead of ransomware
The trojan downloader Nemucod is back with a new campaign. This time, it has changed the payload served to its victims – it's not ransomware.
Firefighting, security and compliance - are they separate issues?
Sometimes a critical issue like a virus outbreak or a major systems malfunction, sometimes something as urgent as a VSIP.
Ransomware: First files … now complete devices
Recently, a particular type of malware, has become increasingly troublesome for both businesses and home users. It is is known as ransomware.
Types of VPN networks and how they work: Do you know which kind to use?
No doubt you are already aware of the importance of using VPN networks to guarantee the privacy of your information.
Malicious scripts in compromised websites - and how to protect yourself
People often highlight those threats that are more or less predictable, but the most dangerous are scripts that are hard for users to detect.
10 tips for staying cyber-safe when on the road
Here is a short guide that we have refreshed to help you travel safely and keep all your data and devices protected.
The 5 most common reasons for corporate data loss
There is no doubt that one of the main assets of a company is the data it stores. It should be adequately protected & available when needed.
Quantum Computation: A cryptography armageddon?
Cryptography is at risk of being broken by quantum computers, but post-quantum cryptography offers solutions. #PQCrypto #QuantumComputing.
Most organisations unconfident in ability to protect data after breach
The majority of IT professionals say they are not confident in their ability to keep their organization’s data secure following a breach.
Adobe warns of Flash zero-day vulnerability, being actively exploited by online criminals
As I write this, if you’re running Adobe Flash on your Windows, Mac, Linux or Chrome OS computer you’re potentially at risk.