A lighter Patch Tuesday, but one heavy with remote code execution bugs
There are fewer bugs in September’s update than in previous months, with RCE vulns making up the bulk of the addressed CVEs
There are fewer bugs in September’s update than in previous months, with RCE vulns making up the bulk of the addressed CVEs
Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up.
The post Why is my Wi‑Fi slow and how do I make it faster? appeared first on WeLiveSecurity
Worok takes aim at various high-profile organizations that operate in multiple sectors and are located primarily in Asia
The post ESET Research uncovers new APT group Worok – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Gateway support for the Microsoft Hyper-V 2016 platform, plus troubleshooting and scalability enhancements.
It pays to do some research before taking a leap into the world of internet-connected toys
The post Toys behaving badly: How parents can protect their family from IoT threats appeared first on WeLiveSecurity
Back by popular demand, five top security experts are stepping up to the microphone to share their expertise on cybersecurity prevention, detection, incident response, and security operations.
The retail sector is no exception when it comes to the growing ransomware challenge that other industries face today. Retail saw the second highest rate of ransomware attacks across sectors, with two in three organizations reporting data encryption following a ransomware attack.
Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol
The post RDP on the radar: An up‑close view of evolving remote access threats appeared first on WeLiveSecurity
Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files
The post Worok: The big picture appeared first on WeLiveSecurity
Optimize the health of your endpoints and servers with our intuitive Account Health Check feature.
What if your organization is hit by a cyberattack that is attributed to a nation state? Would your insurance cover the costs of the attack?
The post Will cyber‑insurance pay out? – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.
The post How to take control over your digital legacy appeared first on WeLiveSecurity
Are you aware of the perils of the world’s no. 1 social media? Do you know how to avoid scams and stay safe on TikTok?
The post TikShock: Don’t get caught out by these 5 TikTok scams appeared first on WeLiveSecurity
As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts
The post French hospital crippled by cyberattack – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The SophosAI Artificial Intelligence team has developed a machine-learning based tool that generates YARA rules for detecting specific types of threats
Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you
The post What is doxing and how to protect yourself appeared first on WeLiveSecurity
You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps
The post Is your personal data all over the internet? 7 steps to cleaning up your online presence appeared first on WeLiveSecurity
With perimeter boundaries quickly blurring thanks to remote care and telehealth, the implicit trust placed in perimeter-centric security makes healthcare dangerously vulnerable.
Both tech giants rush to release fixes for security vulnerabilities that were being exploited in-the-wild
The post Google and Apple release patches for zero‑day flaws – Week in security with Tony Anscombe appeared first on WeLiveSecurity
A Sophos employee from our team in Switzerland was able to fulfil a long-term ambition and also assist an alpine farming family.
As organizations move to cloud services and multifactor authentication, cookies tied to identity and authentication give attackers a new path to compromise.
LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely.
The post A step‑by‑step guide to enjoying LinkedIn safely appeared first on WeLiveSecurity
Don’t worry, elections are safe – this is just one highlight from the DEF CON 30 conference.
The post DEF CON – “don’t worry, the elections are safe” edition appeared first on WeLiveSecurity
The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain
The post How a spoofed email passed the SPF check and landed in my inbox appeared first on WeLiveSecurity
The digital skills gap, especially in cybersecurity, is not a new phenomenon, with the problem now further exacerbated by the prevalence of burnout
The post Black Hat USA 2022: Burnout, a significant issue appeared first on WeLiveSecurity
Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars
The post Black Hat – Windows isn’t the only mass casualty platform anymore appeared first on WeLiveSecurity
The NHS falls victim to an apparent cyberattack, which raises the question of the impact that data breaches have on people’s personal data
The post The potential consequences of a data breach – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Our Security evangelist’s take on this first day of Black Hat 2022, where cyberdefense was on every mind.
The post Black Hat 2022 – Cyberdefense in a global threats era appeared first on WeLiveSecurity
Tinder, Bumble or Grindr – popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks.
The post Safety first: how to tweak the settings on your dating apps appeared first on WeLiveSecurity
A deep-dive into zero trust to help you navigate the threat landscape in a zero-trust world and further secure your organization
The post An eighties classic – Zero Trust appeared first on WeLiveSecurity
4909 Murphy Canyon Road Suite, 500
San Diego, CA 92123
Store
Company
Support
Newsletter
Technology Solutions You Can Trust Dismiss