The Indian government has changed the way in which its officials are allowed to operate when working, it has been announced.
The post India blocks third party email services to government officials appeared first on We Live Security.
ESET
The Indian government has changed the way in which its officials are allowed to operate when working, it has been announced.
The post India blocks third party email services to government officials appeared first on We Live Security.
Hillary Clinton might be in hot water after it is revealed that she never had an official email account, but was instead using a personal one. That’s potentially a breach of federal law, but it’s definitely a security risk.
The post Hillary Clinton used personal email for government business, putting security at risk appeared first on We Live Security.
There have been some high-profile Bitcoin thefts recently. Here are 10 tips on protecting your virtual bitcoin wallet.
The post 10 tips for protecting your virtual Bitcoin wallet appeared first on We Live Security.
As many as 50,000 Uber drivers could have been affected by a security breach last year, potentially leaving their personal data in the hands of an unauthorized third-party, reports Tech Crunch.
The post Uber security breach could leave 50,000 drivers exposed appeared first on We Live Security.
A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.
The post Blu-ray exploits could allow computer malware infection appeared first on We Live Security.
Digital dating has become more popular than ever because of apps like Tinder, but it’s not without risks. Stay safe by remembering the following tips.
The post Tinder – Top 5 security tips appeared first on We Live Security.
Facebook has announced that it paid out $1.3 million last year to ‘white hat’ hackers, as part of a bounty initiative that rewards developers for spotting flaws in the social network.
The post Facebook rewards ‘white hat’ hackers with $1.3m bounty appeared first on We Live Security.
What is an exploit and why are they important?
The post Exploits: What are they and how do they work? appeared first on We Live Security.
How can phishing exploits and botnets affect a business?
The post Phishing, exploits and botnets – how can they affect your business? appeared first on We Live Security.
WhatsApp is one of the most popular instant message apps in the world, but it’s not without security risks. Avoid the dangers with these 5 top tips.
The post WhatsApp – Top 5 security tips appeared first on We Live Security.