Source: welivesecurity.com

ESET researchers help law agencies worldwide to disrupt malware family

ESET researchers help law agencies worldwide to disrupt malware family

NHS set to receive major cash injection to boost cybersecurity measures

NHS set to receive major cash injection to boost cybersecurity measures

Firefox aiming to alert user to websites if it had suffered a data breach

Firefox aiming to alert user to websites if it had suffered a data breach

Keyless convenience is great but it can create a security risk

Keyless convenience is great but it can create a security risk

Malicious apps attempt to distribute malware via Google Play once again

Malicious apps attempt to distribute malware via Google Play once again

Think you deleted that embarrassing WhatsApp message you sent? Think again

Think you deleted that embarrassing WhatsApp message you sent? Think again

Machine-learning algorithms need transparency to comply with GDPR

Machine-learning algorithms need transparency to comply with GDPR

UEFI scanner can help protect your device against malware attacks

UEFI scanner can help protect your device against malware attacks

Windows Movie Maker Scam spreads massively due to high Google ranking

Windows Movie Maker Scam spreads massively due to high Google ranking

Professor Len Adleman explains how he coined the term “computer virus”

Professor Len Adleman explains how he coined the term “computer virus”

IoT threats can be kept at bay by securing your internet router

IoT threats can be kept at bay by securing your internet router

Kiev metro one of several Ukrainian institutes suffering from cyberattack

Kiev metro one of several Ukrainian institutes suffering from cyberattack

Cryptocurrency exchange users targeted by credential stealing apps

Cryptocurrency exchange users targeted by credential stealing apps

Malware in firmware can be as equally creative as it can be destructive

Malware in firmware can be as equally creative as it can be destructive

OSX/Proton spreading again through supply-chain attack

OSX/Proton spreading again through supply-chain attack

Printed data can lead to unintentional leaks if documents are not secured

Printed data can lead to unintentional leaks if documents are not secured