We Live Security

News, views, and insight from the ESET security community
  1. Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.

    The post API security in the spotlight – Week in security with Tony Anscombe appeared first on WeLiveSecurity

  2. As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency

    The post All eyes on APIs: Top 3 API security risks and how to mitigate them appeared first on WeLiveSecurity

  3. A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms

    The post 5 free OSINT tools for social media appeared first on WeLiveSecurity

  4. A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys

    The post Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme appeared first on WeLiveSecurity

  5. ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool

    The post How an innocuous app morphed into a trojan – Week in security with Tony Anscombe appeared first on WeLiveSecurity

  6. ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families

    The post Shedding light on AceCryptor and its operation appeared first on WeLiveSecurity

  7. Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business

    The post Digital security for the self‑employed: Staying safe without an IT team to help appeared first on WeLiveSecurity

  8. ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio

    The post Android app breaking bad: From legitimate screen recording to file exfiltration within a year appeared first on WeLiveSecurity

  9. Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for

    The post The real cost of a free lunch – Week in security with Tony Anscombe appeared first on WeLiveSecurity

  10. A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet

    The post Top 5 search engines for internet‑connected devices and services appeared first on WeLiveSecurity

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form