The majority of IT professionals say they are not confident in their ability to keep their organization’s data secure following a breach, a Gemalto study has found.
The post Most organizations unconfident in ability to protect data after breach appeared first on We Live Security .
The University of Calgary has handed over $20,000 CND to cybercriminals, who had launched a ransomware attack on the institution.
The post University of Calgary bows down to ransomware demands appeared first on We Live Security .
Cases of malware and crimeware incidents are reported daily around the world. Indeed, the number of reports, detections and threats grows constantly.
The post Crimeware: Malware and massive campaigns around the world appeared first on We Live Security .
The Internal Revenue Service (IRS) in the US has relaunched its Get Transcript online service, which it says is delivers enhanced cybersecurity.
The post IRS’s new Get Transcript online service benefits from enhanced cybersecurity appeared first on We Live Security .
Don’t panic. Facebook and Netflix have not suffered a data breach. But it’s quite possible that they are asking you to change your password.
The post Mandatory password reset for some Facebook and Netflix users in wake of mega-breaches appeared first on We Live Security .
With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.
The post Is the federal government doing enough to catch and prosecute computer criminals? appeared first on We Live Security .
It has been two weeks since ESET created a TeslaCrypt decryptor, which allows victims of this ransomware to get their files back. Since then, over 32,000 users around the globe have taken advantage of this opportunity and downloaded the tool.
The post Beyond TeslaCrypt: Crysis family lays claim to parts of its territory appeared first on We Live Security .
Mark Zuckerberg’s social media accounts have been accessed without his permission or knowledge, it has been revealed.
The post Mark Zuckerberg’s social media accounts accessed appeared first on We Live Security .
ESET’s David Harley revisits the Stuxnet phenomenon: How has the way we see the malware and its impact changed?
The post Infrastructure attacks: The next generation appeared first on We Live Security .
Welcome to this week’s security review, including the story of a DNS hijack that sets the victim’s computer to use specific DNS servers.
The post The security review: Crouching Tiger, Hidden DNS appeared first on We Live Security .
Posts navigation
Software and Security Information