A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim
The post Ransomware runs rampant, so how can you combat this threat? appeared first on WeLiveSecurity
A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim
The post Ransomware runs rampant, so how can you combat this threat? appeared first on WeLiveSecurity
How peering into the innards of a future satellite can make cybersecurity in space more palatable
The post DEF CON 29: Satellite hacking 101 appeared first on WeLiveSecurity
Today we are excited to announce some changes to our lineup of Titan Security Keys on the Google Store which provide a simpler experience and make choosing the right security key for you even easier. We will now offer only two types of Titan Security Keys: a USB-A and a USB-C version. Both of these keys have Near Field Communication (NFC) functionality, which allows you to use it with most mobile devices by simply tapping it on the back of your mobile device in order to sign in securely. These keys will be available for all users starting tomorrow, August 10.
In 2018, Google introduced the Titan Security Key as a direct defense against credential phishing. Phishing occurs when an attacker tries to trick you into giving them your username and password, and it remains one of the easiest and most successful ways of breaching accounts online. Paired with our Advanced Protection Program and its industry-leading automatic protections, the Titan Security Key remains one of the best ways to keep your Google Account safe.
Since NFC functionality is now supported by a wide range of Android phones and iPhones, we are discontinuing the Bluetooth Titan Security Key and focusing on the easier and more widely available NFC capability. However, for existing users with our Bluetooth Titan Security Keys, these will continue to work with Bluetooth and will continue to work as an NFC key on most modern mobile devices. Applicable warranties for existing Bluetooth Titan Security Keys will continue to be honored per their terms. All Titan Security Keys are built with a hardware secure element chip that includes firmware engineered by Google to verify the key’s integrity.
If you have a computer with USB-A ports, we recommend you get the USB-A + NFC security key:
If you have a computer with USB-C ports, we recommend you get the USB-C + NFC security key:
If you have an iPad with a USB-C connector you can use the USB-C Titan Security Key. If you have an iPad with a lightning connector, it’s recommended to get a USB-A Titan Security Key with an Apple Lightning adapter:
To purchase a Titan Security Key, visit the Google Store. The USB-A+NFC key,which includes a USB-A to USB-C adapter, is available for $30 and the USB-C+NFC key retails for $35.
The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers
The post IISpy: A complex server‑side backdoor with anti‑forensic features appeared first on WeLiveSecurity
ESET research dissects IIS web server threats – How IIStealer steals credit card data – The flood of spam in your inbox
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Why companies and their security teams need to engage with a lawyer before an incident occurs
The post Black Hat 2021: Lessons from a lawyer appeared first on WeLiveSecurity
Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware scourge?
The post Black Hat 2021: Wanted posters for ransomware slingers appeared first on WeLiveSecurity
The first in our series on IIS threats looks at a malicious IIS extension that intercepts server transactions to steal credit card information
The post IIStealer: A server‑side threat to e‑commerce transactions appeared first on WeLiveSecurity
ESET researchers publish a white paper putting IIS web server threats under the microscope
The post Anatomy of native IIS malware appeared first on WeLiveSecurity
Drowning in spam? A study presented at Black Hat USA 2021 examines if sharing your personal information with major companies contributes to the deluge of nuisance emails, texts and phone calls.
The post Is your personal information being abused? appeared first on WeLiveSecurity