Is that survey real or fake? How to spot a survey scam

“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any surveys online The post Is that survey real or fake? How to spot a survey scam appeared first on WeLiveSecurity

read more

Is that survey real or fake? How to spot a survey scam

“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any surveys online The post Is that survey real or fake? How to spot a survey scam appeared first on WeLiveSecurity

read more

ESET APT Activity Report T3 2022

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post ESET APT Activity Report T3 2022 appeared first on WeLiveSecurity

read more

ESET APT Activity Report T3 2022

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post ESET APT Activity Report T3 2022 appeared first on WeLiveSecurity

read more

Congratulations to the Top MSRC 2022 Q4 Security Researchers!

Congratulations to all the researchers recognized in this quarter’s Microsoft Researcher Recognition Program leaderboard! Thank you to everyone for your hard work and continued partnership to secure customers. The top three researchers of the 2022 Q4 Security...

read more

Mastodon vs. Twitter: Know the differences

Looking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare to each other. The post Mastodon vs. Twitter: Know the differences appeared first on WeLiveSecurity

read more

Mastodon vs. Twitter: Know the differences

Looking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare to each other. The post Mastodon vs. Twitter: Know the differences appeared first on WeLiveSecurity

read more

NCSC-2023-0032 [1.00] [M/M] Kwetsbaarheid verholpen in sudo

Er is een kwetsbaarheid verholpen in sudo's -e optie (ook bekend als sudoedit). Een kwaadwillende met sudoedit-rechten kan de kwetsbaarheid misbruiken voor het bewerken van willekeurige bestanden. Op die manier kan de kwaadwillende verhoogde rechten op het kwetsbare...

read more

NCSC-2023-0032 [1.00] [M/M] Kwetsbaarheid verholpen in sudo

Er is een kwetsbaarheid verholpen in sudo's -e optie (ook bekend als sudoedit). Een kwaadwillende met sudoedit-rechten kan de kwetsbaarheid misbruiken voor het bewerken van willekeurige bestanden. Op die manier kan de kwaadwillende verhoogde rechten op het kwetsbare...

read more

Top 10 Venmo scams – and how to stay safe

Don’t be the next victim – here's what to know about some of the most common tricks that scammers use on the payment app The post Top 10 Venmo scams – and how to stay safe appeared first on WeLiveSecurity

read more

Top 10 Venmo scams – and how to stay safe

Don’t be the next victim – here's what to know about some of the most common tricks that scammers use on the payment app The post Top 10 Venmo scams – and how to stay safe appeared first on WeLiveSecurity

read more

Now you can legally repair your tech – sort of

A new law portends a future where (we hope) it will be easier for us all to repair, fix, upgrade, and just tinker with things we already own The post Now you can legally repair your tech – sort of appeared first on WeLiveSecurity

read more

Now you can legally repair your tech – sort of

A new law portends a future where (we hope) it will be easier for us all to repair, fix, upgrade, and just tinker with things we already own The post Now you can legally repair your tech – sort of appeared first on WeLiveSecurity

read more

StrongPity espionage campaign targeting Android users

ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version The post StrongPity espionage campaign targeting Android users appeared...

read more

StrongPity espionage campaign targeting Android users

ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version The post StrongPity espionage campaign targeting Android users appeared...

read more

Cracked it! Highlights from KringleCon 5: Golden Rings

Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings The post Cracked it! Highlights from KringleCon 5: Golden Rings appeared first on...

read more

Cracked it! Highlights from KringleCon 5: Golden Rings

Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings The post Cracked it! Highlights from KringleCon 5: Golden Rings appeared first on...

read more

Gaming: How much is too much for our children?

With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity

read more

Gaming: How much is too much for our children?

With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity

read more

NCSC-2023-0003 [1.00] [M/M] Kwetsbaarheid verholpen in MISP

Er is een kwetsbaarheid verholpen in MISP. De kwetsbaarheid stelt een geauthenticeerde kwaadwillende in staat een Cross-Site Scripting (XSS) aanval uit te voeren. Een dergelijke aanval kan leiden tot de uitvoer van willekeurige scriptcode in de browser waarmee de...

read more

NCSC-2023-0003 [1.00] [M/M] Kwetsbaarheid verholpen in MISP

Er is een kwetsbaarheid verholpen in MISP. De kwetsbaarheid stelt een geauthenticeerde kwaadwillende in staat een Cross-Site Scripting (XSS) aanval uit te voeren. Een dergelijke aanval kan leiden tot de uitvoer van willekeurige scriptcode in de browser waarmee de...

read more

2022 in review: 10 of the year’s biggest cyberattacks

The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022 The post 2022 in review: 10 of the year’s biggest cyberattacks appeared first on...

read more

2022 in review: 10 of the year’s biggest cyberattacks

The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022 The post 2022 in review: 10 of the year’s biggest cyberattacks appeared first on...

read more

Help! My kid has asked Santa for a smartphone

The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them use their new gadget safely and responsibly. The post Help! My kid has asked Santa for a smartphone appeared first on WeLiveSecurity

read more

Help! My kid has asked Santa for a smartphone

The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them use their new gadget safely and responsibly. The post Help! My kid has asked Santa for a smartphone appeared first on WeLiveSecurity

read more

Cybersecurity Trends 2023: Securing our hybrid lives

ESET experts offer their reflections on what the continued blurring of boundaries between different spheres of life means for our human and social experience – and especially our cybersecurity and privacy The post Cybersecurity Trends 2023: Securing our hybrid lives...

read more

Cybersecurity Trends 2023: Securing our hybrid lives

ESET experts offer their reflections on what the continued blurring of boundaries between different spheres of life means for our human and social experience – and especially our cybersecurity and privacy The post Cybersecurity Trends 2023: Securing our hybrid lives...

read more

BlueHat 2023: Applications to Attend NOW OPEN!

We are excited to announce that applications to attend BlueHat 2023 are now open!   BlueHat 2023 will be the 20th version of the BlueHat conference and will once again be on the Microsoft campus in Redmond, WA, USA, from February 8 – 9, 2023.   Hosted by the Microsoft...

read more

NCSC-2022-0751 [1.00] [M/M] Kwetsbaarheid verholpen in Grafana

Grafana Labs heeft een kwetsbaarheid verholpen in Grafana. De kwetsbaarheid stelt een geauthenticeerde kwaadwillende op afstand in staat om willekeurige code uit te voeren in de browser op het systeem van een slachtoffer. Hiertoe dient de kwaadwillende het slachtoffer...

read more

NCSC-2022-0751 [1.00] [M/M] Kwetsbaarheid verholpen in Grafana

Grafana Labs heeft een kwetsbaarheid verholpen in Grafana. De kwetsbaarheid stelt een geauthenticeerde kwaadwillende op afstand in staat om willekeurige code uit te voeren in de browser op het systeem van een slachtoffer. Hiertoe dient de kwaadwillende het slachtoffer...

read more

Top tips to save energy used by your electronic devices

With the rapidly rising energy prices putting a strain on many households, what are some quick wins to help reduce the power consumption of your gadgets? The post Top tips to save energy used by your electronic devices appeared first on WeLiveSecurity

read more

Top tips to save energy used by your electronic devices

With the rapidly rising energy prices putting a strain on many households, what are some quick wins to help reduce the power consumption of your gadgets? The post Top tips to save energy used by your electronic devices appeared first on WeLiveSecurity

read more

A Ride on the Wild Side with Hacking Heavyweight Sick Codes

Beverage of Choice: Krating Daeng (Thai Red Bull) Industry Influencer he Admires: Casey John Ellis What did you want to be when you grew up? A physician and nearly did Hobbies (Present & Past): Motorcycling & Australian Football Bucket List: Continuing to...

read more

RansomBoggs: New ransomware targeting Ukraine

ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm's fingerprints all over it The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity

read more

RansomBoggs: New ransomware targeting Ukraine

ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm's fingerprints all over it The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity

read more

10 tips to avoid Black Friday and Cyber Monday scams

It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams doing the rounds this holiday shopping season The post 10 tips to avoid Black Friday and Cyber Monday scams appeared first on WeLiveSecurity

read more

10 tips to avoid Black Friday and Cyber Monday scams

It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams doing the rounds this holiday shopping season The post 10 tips to avoid Black Friday and Cyber Monday scams appeared first on WeLiveSecurity

read more

NCSC-2022-0735 [1.01] [M/H] Kwetsbaarheden verholpen in XWiki

Er zijn kwetsbaarheden verholpen in XWiki. De kwetsbaarheden stellen een kwaadwillende in staat aanvallen uit te voeren die leiden tot de volgende categorieën schade: Cross-Site Request Forgery (XSRF) Denial-of-Service (DoS) Manipulatie van gegevens Omzeilen van...

read more

NCSC-2022-0735 [1.01] [M/H] Kwetsbaarheden verholpen in XWiki

Er zijn kwetsbaarheden verholpen in XWiki. De kwetsbaarheden stellen een kwaadwillende in staat aanvallen uit te voeren die leiden tot de volgende categorieën schade: Cross-Site Request Forgery (XSRF) Denial-of-Service (DoS) Manipulatie van gegevens Omzeilen van...

read more

Security fatigue is real: Here’s how to overcome it

Do your employees take more risks with valuable data because they’ve become desensitized to security guidance? Spot the symptoms before it’s too late. The post Security fatigue is real: Here’s how to overcome it appeared first on WeLiveSecurity

read more

Security fatigue is real: Here’s how to overcome it

Do your employees take more risks with valuable data because they’ve become desensitized to security guidance? Spot the symptoms before it’s too late. The post Security fatigue is real: Here’s how to overcome it appeared first on WeLiveSecurity

read more

NCSC-2022-0735 [1.00] [M/H] Kwetsbaarheden verholpen in XWiki

Er zijn kwetsbaarheden verholpen in XWiki. Een kwaadwillende kan door het importeren van een geprepareerd XAR-bestand de kwetsbaarheid misbruiken om iedere pagina te bekijken of te bewerken, terwijl deze niet beschikbaar zou moeten zijn voor de kwaadwillende. Ook kan...

read more

NCSC-2022-0735 [1.00] [M/H] Kwetsbaarheden verholpen in XWiki

Er zijn kwetsbaarheden verholpen in XWiki. Een kwaadwillende kan door het importeren van een geprepareerd XAR-bestand de kwetsbaarheid misbruiken om iedere pagina te bekijken of te bewerken, terwijl deze niet beschikbaar zou moeten zijn voor de kwaadwillende. Ook kan...

read more

Tor vs. VPN: Which should you choose?

Both Tor and a VPN can greatly help you keep prying eyes away from your online life, but they’re also two very different beasts. Which is better for you? The post Tor vs. VPN: Which should you choose? appeared first on WeLiveSecurity

read more

Tor vs. VPN: Which should you choose?

Both Tor and a VPN can greatly help you keep prying eyes away from your online life, but they’re also two very different beasts. Which is better for you? The post Tor vs. VPN: Which should you choose? appeared first on WeLiveSecurity

read more

NCSC-2022-0722 [1.00] [M/H] Kwetsbaarheid verholpen in Zoom

Er is een kwetsbaarheid verholpen in Zoom. De kwetsbaarheid stelt een lokale kwaadwillende in staat toegang te krijgen tot gevoelige gegevens, zoals meetinggegevens en chatberichten die zijn verstuurd tijdens meetings. Dit wordt veroorzaakt door een combinatie van...

read more

NCSC-2022-0722 [1.00] [M/H] Kwetsbaarheid verholpen in Zoom

Er is een kwetsbaarheid verholpen in Zoom. De kwetsbaarheid stelt een lokale kwaadwillende in staat toegang te krijgen tot gevoelige gegevens, zoals meetinggegevens en chatberichten die zijn verstuurd tijdens meetings. Dit wordt veroorzaakt door een combinatie van...

read more

NCSC-2022-0720 [1.00] [M/M] Kwetsbaarheden verholpen in PHP

Er zijn kwetsbaarheden verholpen in PHP. De kwetsbaarheden stellen een kwaadwillende in staat aanvallen uit te voeren die leiden tot de volgende categorieën schade: Denial-of-Service (DoS) Manipulatie van gegevens (Remote) code execution (Gebruikersrechten) Toegang...

read more

NCSC-2022-0720 [1.00] [M/M] Kwetsbaarheden verholpen in PHP

Er zijn kwetsbaarheden verholpen in PHP. De kwetsbaarheden stellen een kwaadwillende in staat aanvallen uit te voeren die leiden tot de volgende categorieën schade: Denial-of-Service (DoS) Manipulatie van gegevens (Remote) code execution (Gebruikersrechten) Toegang...

read more

ESET APT Activity Report T2 2022

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022 The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity

read more

ESET APT Activity Report T2 2022

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022 The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity

read more

NCSC-2022-0689 [1.00] [M/H] Kwetsbaarheden verholpen in Xen

De ontwikkelaars van Xen hebben kwetsbaarheden verholpen in Xen. De kwetsbaarheden bevinden zich in de xenstored en stellen een kwaadwillende met rechten om guest-images te implementeren en configureren in staat om middels malafide guests een Denial-of-Service te...

read more

NCSC-2022-0689 [1.00] [M/H] Kwetsbaarheden verholpen in Xen

De ontwikkelaars van Xen hebben kwetsbaarheden verholpen in Xen. De kwetsbaarheden bevinden zich in de xenstored en stellen een kwaadwillende met rechten om guest-images te implementeren en configureren in staat om middels malafide guests een Denial-of-Service te...

read more

NCSC-2022-0684 [1.00] [M/M] Kwetsbaarheid verholpen in Expat

De ontwikkelaars van Expat hebben een kwetsbaarheid verholpen. Een kwaadwillende kan de kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken, of mogelijk om willekeurige code uit te voeren met rechten van de applicatie waarin de libexpat library wordt...

read more

NCSC-2022-0684 [1.00] [M/M] Kwetsbaarheid verholpen in Expat

De ontwikkelaars van Expat hebben een kwetsbaarheid verholpen. Een kwaadwillende kan de kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken, of mogelijk om willekeurige code uit te voeren met rechten van de applicatie waarin de libexpat library wordt...

read more

Why your phone is slow – and how to speed it up

You probably don’t have to ditch your phone just yet – try these simple tips and tricks to make any Android device or iPhone run faster The post Why your phone is slow – and how to speed it up appeared first on WeLiveSecurity

read more

Why your phone is slow – and how to speed it up

You probably don’t have to ditch your phone just yet – try these simple tips and tricks to make any Android device or iPhone run faster The post Why your phone is slow – and how to speed it up appeared first on WeLiveSecurity

read more

Congratulations to the Top MSRC 2022 Q3 Security Researchers!

Congratulations to all the researchers recognized in this quarter’s Microsoft Researcher Recognition Program leaderboard! Thank you to everyone for your hard work and continued partnership to secure customers. The top three researchers of the 2022 Q3 Security...

read more

5 steps to protect your school from cyberattacks

What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay? The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity

read more

5 steps to protect your school from cyberattacks

What can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep threats at bay? The post 5 steps to protect your school from cyberattacks appeared first on WeLiveSecurity

read more

Life in pursuit of answers: In the words of Ada Yonath

From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell. The post Life in pursuit of answers: In the words of Ada Yonath appeared first on WeLiveSecurity

read more

Life in pursuit of answers: In the words of Ada Yonath

From a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is the exceptional life of Ada Yonath in a nutshell. The post Life in pursuit of answers: In the words of Ada Yonath appeared first on WeLiveSecurity

read more

BlueHat 2023 Call for Papers is Now Open!

For nearly 20 years, BlueHat has been where the security research community, and Microsoft security professionals come together as peers, to share, debate, challenge, learn, and exchange ideas in the interest of creating a safer and more secure world for all. We are...

read more

Post Title

Improvements in Security Update Notifications Delivery – And a New Delivery Method At MSRC, we are passionate about ensuring our customers have a positive experience when they use the Microsoft Security Update Guide (SUG). A big part of improving that experience is...

read more

POLONIUM targets Israel with Creepy malware

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity

read more

POLONIUM targets Israel with Creepy malware

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity

read more

ESET Threat Report T2 2022

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity

read more

ESET Threat Report T2 2022

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T2 2022 appeared first on WeLiveSecurity

read more

NCSC-2022-0612 [1.01] [M/M] Kwetsbaarheid verholpen in Expat

Er is een kwetsbaarheid verholpen in Expat. Een kwaadwillende kan een use-after-free veroorzaken in libexpat via de doContent functie in xmlparse.c. Misbruik van de kwetsbaarheid leidt mogelijk tot de volgende categorieën schade: Denial-of-Service (DoS) Manipulatie...

read more

NCSC-2022-0612 [1.01] [M/M] Kwetsbaarheid verholpen in Expat

Er is een kwetsbaarheid verholpen in Expat. Een kwaadwillende kan een use-after-free veroorzaken in libexpat via de doContent functie in xmlparse.c. Misbruik van de kwetsbaarheid leidt mogelijk tot de volgende categorieën schade: Denial-of-Service (DoS) Manipulatie...

read more

NCSC-2022-0612 [1.00] [M/M] Kwetsbaarheid verholpen in Expat

Er is een kwetsbaarheid verholpen in Expat. Een kwaadwillende kan een use-after-free veroorzaken in libexpat via de doContent functie in xmlparse.c. Misbruik van de kwetsbaarheid leidt mogelijk tot de volgende categorieën schade: Denial-of-Service (DoS) Manipulatie...

read more

NCSC-2022-0612 [1.00] [M/M] Kwetsbaarheid verholpen in Expat

Er is een kwetsbaarheid verholpen in Expat. Een kwaadwillende kan een use-after-free veroorzaken in libexpat via de doContent functie in xmlparse.c. Misbruik van de kwetsbaarheid leidt mogelijk tot de volgende categorieën schade: Denial-of-Service (DoS) Manipulatie...

read more

Protecting teens from sextortion: What parents should know

Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity

read more

Protecting teens from sextortion: What parents should know

Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity

read more

5 tips to help children navigate the internet safely

The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits? The post 5 tips to help children navigate the internet safely...

read more

5 tips to help children navigate the internet safely

The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits? The post 5 tips to help children navigate the internet safely...

read more