The vulnerability of critical infrastructure, including energy grids, to cyberattacks has been a growing concern worldwide. Many nations have been scrambling to improve their defenses vis-à-vis threats faced by services that are critical to the continuity of our daily lives.
The post US forms dedicated office to help avert cyberattacks at infrastructure appeared first on WeLiveSecurity
A record-high proportion of organizations worldwide (67%) said that they had been breached at some point, up from 56% in the report’s previous edition.
The post Concerns about data breaches hitting all-time high appeared first on WeLiveSecurity
Ransomware in 2017 saw users and businesses across the globe trying to cope with campaigns such as Petya and WannaCryptor. Not to be outdone, Android ransomware had a year full of innovative infiltration and rougher extortion as highlighted by the latest ESET research whitepaper.
The post Android ransomware in 2017: Innovative infiltration and rougher extortion appeared first on WeLiveSecurity
This week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been released by Microsoft.
The post Patch now! Microsoft fixes over 50 serious security flaws appeared first on WeLiveSecurity
Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that’s what these TVs have become – internet-connected ‘computers’, much like mobile phones. It would no doubt help if we thought of them as such and treated them accordingly.
The post How safe are you around your smart TV? appeared first on WeLiveSecurity
These developments show that security technology is now keeping up, or outpacing other technological and regulatory developments. Thus, while users’ wants often continue to trump their appreciation of risk, the industry has responded and in many cases gotten ahead of popular demand.
The post Blockchain Hardened devices: Can they restore privacy with security by design? appeared first on WeLiveSecurity
If undetected by a user’s security solution or content- or ad-blocker, the script ran in the background unbeknown to the user until the webpage was closed. A number of the affected websites, including that of the ICO, were also offline for hours in the aftermath of the attack.
The post US and UK government websites hijacked to mine cryptocurrency on visitors’ machines appeared first on WeLiveSecurity
If you’re still running a website that is still using insecure HTTP then it’s time to wake up and drink the coffee. Because unless you take action soon, you’re going to find many of your visitors are going to distrust your website.
The post All HTTP websites to soon be marked as “not secure” by Google Chrome appeared first on WeLiveSecurity
This is aimed at improving security at the time of the handshake, which is when the key is being exchanged. As a result, WPA3 is poised to provide robust security even if short or weak passwords are used, i.e. those that don’t contain a combination of letters, numbers and symbols.
The post How will WPA3 improve WiFi security? appeared first on WeLiveSecurity
According to US authorities, the enterprise aimed at becoming the premier destination for the buying and selling of stolen payment card data and forged identification documents. It is believed that the losses that the Infraud Organization had intended to cause were north of $2.2 billion.
The post Global cybercrime behemoth busted, 36 people indicted appeared first on WeLiveSecurity