Source: www.welivesecurity.com – Author: Matthieu Faou A curious case of a threat actor at the border between crimeware and cyberespionage 8 Jun 2023 – 11:30AM A...
Tag: Welivesecurity.com
Hear no evil: Ultrasound attacks on voice assistants – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Márk Szabó How your voice assistant could do the bidding of a hacker – without you ever hearing a thing Regular WeLiveSecurity...
7 tips for spotting a fake mobile app – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Roman Cuprik Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security...
API security in the spotlight – Week in security with Tony Anscombe – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Editor Given the reliance of today’s digital world on APIs and the fact that attacks targeting them continue to rise sharply, API...
All eyes on APIs: Top 3 API security risks and how to mitigate them – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Phil Muncaster As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements...
5 free OSINT tools for social media – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Martina López A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook...
Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Roman Cuprik A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target...
How an innocuous app morphed into a trojan – Week in security with Tony Anscombe – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Editor ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool This...
Shedding light on AceCryptor and its operation – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Jakub Kaloč ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families In this...
Digital security for the self‑employed: Staying safe without an IT team to help – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Phil Muncaster Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business...
Android app breaking bad: From legitimate screen recording to file exfiltration within a year – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Lukas Stefanko ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio ESET...
The real cost of a free lunch – Week in security with Tony Anscombe – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Editor Don’t download software from non-reputable websites and sketchy links – you might be in for more than you bargained for Chances...