It’s important to ensure your child’s data and devices are secure at school and at home. Check out our to back to school digital security guide.
The post Make password into a story and more parental hacks appeared first on We Live Security.
It’s important to ensure your child’s data and devices are secure at school and at home. Check out our to back to school digital security guide.
The post Make password into a story and more parental hacks appeared first on We Live Security.
With children gradually going back to school in Latin American regions, it’s time to remind our children of the importance of IT security.
The post Back to school: 5 challenges that parents and teachers face in IT security appeared first on We Live Security.
Security Researcher Joshua Drake has published about a vulnerability in the heart of Android that could allow attackers to steal information from Android devices through remotely execute code via a crafted MMS. Potentially 95% of Android devices should be vulnerable. Have you checked yours?
The post Are you still vulnerable to Stagefright? Get your Android device checked appeared first on We Live Security.
Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.
The post Signatures, product testing, and the lingering death of AV appeared first on We Live Security.
Don’t be cyber-flashed by a pervert. Make sure that your iOS device’s AirDrop settings are configured properly to protect your eyes from unpleasantness.
The post How to stop pervy pics popping up on your iPhone appeared first on We Live Security.
If Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the new DEF CON. This year it got some Ikea furniture to spruce up its mom’s basement. Not totally commercial, but definitely more – first apartment folding furniture – chic; the basement just got upgraded.
The post DEF CON – Upgrading your mom’s basement appeared first on We Live Security.
This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
The post Black Hat 2015 – Threats hit the road appeared first on We Live Security.
Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining security to the CEO. A few succeeded in this new role, but enough to convince the execs that if something bad happens in IT, it happens to the execs shortly thereafter.
The post How’s Black Hat in 2015? It grows up (and leaves mom’s basement) appeared first on We Live Security.
Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.
The post Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft’s new OS appeared first on We Live Security.
It’s not all about crashing cars and hacking guns: what’s hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.
The post Black Hat 2015: What to watch out for, besides cars and guns appeared first on We Live Security.