We Live Security stories - Page 2
![Story image](../../../../../uploads/story/2016/12/14/preview_ThinkstockPhotos-502999576.webp)
Why combining technology with standards could combat fraud
Wed, 14th Dec 2016
#
malware
#
cybersecurity
#
software development
Fraud is still on the increase due to the use of new technologies, causing losses to both users and companies. What is being done to avoid this?.
![Story image](../../../../../uploads/story/2016/12/01/preview_ThinkstockPhotos-533440399.webp)
Siemens-branded CCTV webcams require urgent firmware patch
Thu, 1st Dec 2016
#
ddos
#
surveillance
#
exploits
Siemens-branded IP-based CCTV cameras are the latest internet-connected devices to be found vulnerable to hacking attacks.
![Story image](../../../../../uploads/story/2016/12/01/preview_ThinkstockPhotos-512328734.webp)
Organisations 'not doing enough' to prevent data breaches
Thu, 1st Dec 2016
#
breach prevention
#
cybersecurity
#
data breach
Up-to-date security systems, usable security, and awareness on how to deal with threats and social engineering are needed.
![Story image](../../../../../uploads/story/2016/11/22/preview_ThinkstockPhotos-612728674.webp)
The odd, 8-year legacy of the Conficker worm
Tue, 22nd Nov 2016
#
malware
#
cybersecurity
#
cyber attacks
Conficker’s legacy lingers eight years after it first emerged, infecting 11 million devices worldwide and costing up to USD $9 billion in cleanup.
![Story image](../../../../../uploads/story/2016/11/16/preview_ThinkstockPhotos-501362758.webp)
Working in the cyber security industry
Wed, 16th Nov 2016
#
malware
#
cybersecurity
#
cyber criminal
Diving into cyber security careers, industry experts reveal the skills needed to fight cybercrime and the dynamic nature of this ever-evolving field.
![Story image](../../../../../uploads/story/2016/11/01/preview_ThinkstockPhotos-100041799.webp)
10 gadgets every white hat hacker needs in their toolkit
Tue, 1st Nov 2016
#
cybersecurity
#
hacking
#
chip
In the ever-evolving realm of cybersecurity, these 10 essential gadgets empower white hat hackers to uncover vulnerabilities and enhance defences.
![Story image](../../../../../uploads/story/2016/10/17/preview_ThinkstockPhotos-529332337.webp)
Online safety tips for social media and IM fans
Mon, 17th Oct 2016
#
malware
#
cybersecurity
#
we live security
Stay safe online! As Cyber Security Month kicks off, learn key tips to protect your social media and messaging accounts.
![Story image](../../../../../uploads/story/2016/10/13/preview_ThinkstockPhotos-514568144.webp)
Do you know how to steer away from online banking trouble?
Thu, 13th Oct 2016
#
fintechs
#
online banking
#
digital banking
Checking your account balance, paying bills and managing your finances...nowadays, it is pretty normal to do all these things online.
![Story image](../../../../../uploads/story/2016/10/11/preview_ThinkstockPhotos-486917765.webp)
How to handle multiple devices and passwords at once
Tue, 11th Oct 2016
#
cybersecurity
#
passwords
#
we live security
It seems that for every work device you use, you have a personal alternative. But this means having twice as many gadgets & security concerns.
![Story image](../../../../../uploads/story/2016/10/04/preview_ThinkstockPhotos-187383081.webp)
How do you work out a country’s level of cybersecurity?
Tue, 4th Oct 2016
#
cybersecurity
#
we live security
Initially developed in 2013, the GCI is engaged in a perpetual update process to determine the relevant aspects of the security of ITU member states.
![Story image](../../../../../uploads/story/2016/09/20/preview_Data_breach.webp)
Snowden: 4 big security and privacy assumptions he undermined
Tue, 20th Sep 2016
#
malware
#
cybersecurity
#
we live security
I want to discuss four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.
![Story image](../../../../../uploads/story/2016/09/13/preview_ThinkstockPhotos-484347847.webp)
Business security: Securing your data weak points
Tue, 13th Sep 2016
#
cybersecurity
#
we live security
#
retailers
So where do I start? There are core tenets that will end up being repeated but here a few essential points to consider.
![Story image](../../../../../uploads/story/2016/09/06/preview_ThinkstockPhotos-529332337.webp)
How to give your social media security an important boost
Wed, 7th Sep 2016
#
cybersecurity
#
social media
#
we live security
Social media has become an important part of modern life - one that can cause serious headaches if you’re sharing with a wider audience than intended.
![Story image](../../../../../uploads/story/2016/09/06/preview_ThinkstockPhotos-522749369.webp)
Ransomware: To pay or not to pay, that is the question
Tue, 6th Sep 2016
#
malware
#
ransomware
#
cybersecurity
We sometimes hear of instances where organisations pay ransomware even though they do have backups because it’s the cheaper option.
![Story image](../../../../../uploads/story/2016/08/15/preview_ThinkstockPhotos-511068346.webp)
Nemucod is back and serving an ad-clicking backdoor instead of ransomware
Mon, 15th Aug 2016
#
malware
#
cybersecurity
#
trojan
The trojan downloader Nemucod is back with a new campaign. This time, it has changed the payload served to its victims – it's not ransomware.
![Story image](../../../../../uploads/story/2016/07/27/preview_ThinkstockPhotos-149046319.webp)
Firefighting, security and compliance - are they separate issues?
Thu, 4th Aug 2016
#
cybersecurity
#
cloud services
#
firefighting
Sometimes a critical issue like a virus outbreak or a major systems malfunction, sometimes something as urgent as a VSIP.
![Story image](../../../../../uploads/story/2016/07/11/preview_Phone_stealing.webp)
Ransomware: First files … now complete devices
Mon, 11th Jul 2016
#
malware
#
ransomware
#
cybersecurity
Recently, a particular type of malware, has become increasingly troublesome for both businesses and home users. It is is known as ransomware.
![Story image](../../../../../uploads/story/2016/07/11/preview_ThinkstockPhotos-518339196.webp)
Types of VPN networks and how they work: Do you know which kind to use?
Mon, 11th Jul 2016
#
malware
#
vpns
#
wireless networks
No doubt you are already aware of the importance of using VPN networks to guarantee the privacy of your information.
![Story image](../../../../../uploads/story/2016/07/05/preview_ThinkstockPhotos-530183486.webp)
Malicious scripts in compromised websites - and how to protect yourself
Tue, 5th Jul 2016
#
malware
#
cybersecurity
#
we live security
People often highlight those threats that are more or less predictable, but the most dangerous are scripts that are hard for users to detect.
![Story image](../../../../../uploads/story/2016/07/05/preview_Worm_in_computer.webp)
10 tips for staying cyber-safe when on the road
Tue, 5th Jul 2016
#
malware
#
cybersecurity
#
banking
Here is a short guide that we have refreshed to help you travel safely and keep all your data and devices protected.