ESET research discovers ESPecter bootkit – FontOnLake targeting Linux – Fake SafeMoon app update
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET research discovers ESPecter bootkit – FontOnLake targeting Linux – Fake SafeMoon app update
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
ESET researchers discover a malware family with tools that show signs they’re used in targeted attacks
The post FontOnLake: Previously unknown malware family targeting Linux appeared first on WeLiveSecurity
Two-factor authentication is a simple way to greatly enhance the security of your account
The post Google to turn on 2FA by default for 150 million users, 2 million YouTubers appeared first on WeLiveSecurity
Cryptocurrencies rise and fall, but one thing stays the same – cybercriminals attempt to cash in on the craze
The post To the moon and hack: Fake SafeMoon app drops malware to spy on you appeared first on WeLiveSecurity
What happens to our digital accounts when we stop using them? It’s a question we should all ask ourselves, because when we are no longer keeping tabs on what’s happening with old accounts, they can become targets for cybercrime.
In fact, quite a few recent high-profile breaches targeted inactive accounts. The Colonial Pipeline ransomware attack came through an inactive account that didn’t use multifactor authentication, according to a consultant who investigated the incident. And in the case of the recent T-Mobile breach this summer, information from inactive prepaid accounts was accessed through old billing files. Inactive accounts can pose a serious security risk.
For Google users, Inactive Account Manager helps with that problem. You can decide when Google should consider your account inactive and whether Google should delete your data or share it with a trusted contact.
Once you sign up for Inactive Account Manager, available in My Account settings, you are asked to decide three things:
Setting up an Inactive Account plan is a simple step you can take to protect your data, secure your account in case it becomes inactive, and ensure that your digital legacy is shared with your trusted contacts in case you become unable to access your account. Our Privacy Checkup now reminds you to set up a plan for your account, and we’ll send you an occasional reminder about your plan via email.
At Google, we are constantly working to keep you safer online. This October, as we celebrate Cybersecurity Awareness Month, we want to remind our users of the security and privacy controls they have at their fingertips. For more ways to enhance your security check out our top five safety tips and visit our Safety Center to learn all the ways Google helps keep you safer online, every day.
ESET research discovers a previously undocumented UEFI bootkit with roots going back all the way to at least 2012
The post UEFI threats moving to the ESP: Introducing ESPecter bootkit appeared first on WeLiveSecurity
New ESET Threat Report is out – Cybersecurity Awareness Month begins today – What organizations should do to secure their VPNs
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Today, we are excited to announce our sponsorship for the Secure Open Source (SOS) pilot program run by the Linux Foundation. This program financially rewards developers for enhancing the security of critical open source projects that we all depend on. We are starting with a $1 million investment and plan to expand the scope of the program based on community feedback.
What security improvements qualify?
We’ll continue adding to the above list, so check our FAQ for updates. You may also submit improvements not listed above, if you provide justification and evidence to help us understand the complexity and impact of the work.
Only work completed after October 1, 2021 qualifies for SOS rewards.
Upfront funding is available on a limited case by case basis for impactful improvements of moderate to high complexity over a longer time span. Such requests should explain why funding is required upfront and provide a detailed plan of how the improvements will be landed.
Please include as much data or supporting evidence as possible to help us evaluate the significance of the project and your improvements.
Looking Ahead
The campaign may last for a month, but we should remember that cybersecurity is a year-round affair
The post October is Cybersecurity Awareness Month! Why being cyber‑smart matters appeared first on WeLiveSecurity
Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds
The post Hackers could force locked iPhones to make contactless payments appeared first on WeLiveSecurity