Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents This article has been indexed from WeLiveSecurity Read the original article: The long-tail costs of a…
Category: welivesecurity
My health information has been stolen. Now what?
As health data continues to be a prized target for hackers, here’s how to minimize the fallout from a breach impacting your own health records This article has been indexed from WeLiveSecurity Read the original article: My health information has…
Hacktivism is evolving – and that could be bad news for organizations everywhere
Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat This article has been indexed from WeLiveSecurity Read the original article: Hacktivism is evolving – and that could be…
ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024
The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023 This article has been indexed from WeLiveSecurity Read the original article:…
How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe
The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app This article has been indexed from WeLiveSecurity Read the original article: How Arid Viper…
Arid Viper poisons Android apps with AridSpy
ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine This article has been indexed from WeLiveSecurity Read the original article: Arid Viper poisons Android apps with AridSpy
WeLiveSecurity wins Best Cybersecurity Vendor Blog award!
The award is an excellent opportunity for us to thank our readers and to recognize the depth of talent of ESET’s security researchers and writers This article has been indexed from WeLiveSecurity Read the original article: WeLiveSecurity wins Best Cybersecurity…
560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe
Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data. Watch as Tony discusses the story and provides useful tips on how to protect people’s data. This article has…
The job hunter’s guide: Separating genuine offers from scams
$90,000/year, full home office, and 30 days of paid leave, and all for a job as a junior data analyst – unbelievable, right? This and many other job offers are fake though – made just to ensnare unsuspecting victims into…
What happens when facial recognition gets it wrong – Week in security with Tony Anscombe
A woman in London has been misidentified as a shoplifter by a facial recognition system amid fresh concerns over the technology’s accuracy and reliability This article has been indexed from WeLiveSecurity Read the original article: What happens when facial recognition…