This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
The post Black Hat 2015 – Threats hit the road appeared first on We Live Security.
![]()
ESET
This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
The post Black Hat 2015 – Threats hit the road appeared first on We Live Security.
![]()
An alarming number of computers in the Welsh National Health Service (NHS) are running Windows XP.
Is that really an appropriate level of security for computers that could be holding patients’ medical information?
The post 20,000 NHS Wales PCs still running Windows XP from beyond the grave appeared first on We Live Security.
![]()
Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining security to the CEO. A few succeeded in this new role, but enough to convince the execs that if something bad happens in IT, it happens to the execs shortly thereafter.
The post How’s Black Hat in 2015? It grows up (and leaves mom’s basement) appeared first on We Live Security.
![]()
Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.
The post Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft’s new OS appeared first on We Live Security.
![]()
WordPress has announced its latest update, urging all users to download version 4.2.4 immediately.
The post WordPress releases latest update with 4.2.4 appeared first on We Live Security.
![]()
Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.
The post Terracotta VPN network helps hackers remain anonymous appeared first on We Live Security.
![]()
Senior research fellow Righard J. Zwienenberg on why the Internet of Things could be *the* key security issue for the foreseeable future.
The post Lightbulb moment: Why the Internet of Things is a security watershed appeared first on We Live Security.
![]()
This article looks at the core idea behind applying ISO 27001.
The post What is the core idea behind applying ISO 27001? appeared first on We Live Security.
![]()
Hacker sends woman images of herself and her boyfriend, which were captured through their own webcam.
The post Hacker sends woman pictures of herself from her own webcam appeared first on We Live Security.
![]()
Hackers have exploited a zero-day vulnerability in the latest version of Apple’s OS X.
The post Hackers exploit OS X zero-day vulnerability appeared first on We Live Security.
![]()