Auto Added by WPeMatico

Marriott hacked again, 5.2 million guests affected

Bad actors accessed a range of personally identifiable information, including names, dates of birth and a lot more The post Marriott hacked again, 5.2 million guests affected appeared first on WeLiveSecurity

By |2020-04-01T10:42:13-04:00April 1st, 2020|Cybersecurity|Comments Off on Marriott hacked again, 5.2 million guests affected

Is the Coronavirus becoming an attack channel for ransomware?

Nowadays, everybody is aware of the term, ‘Novel Coronavirus.’ All over the world, 7.7 Billion people have gotten affected by Coronavirus directly or indirectly. It has impacted so badly that currently, entire mankind is frightened and worried about the future of their survival. As per sources, it originated in China…

By |2020-03-30T06:53:19-04:00March 30th, 2020|coronavirus, Cybersecurity, ransomware|Comments Off on Is the Coronavirus becoming an attack channel for ransomware?

How can 1.33 billion people embrace digitalization in an era of damaging malware?

There are approximately 451 million monthly active Internet users in India. This estimate from a report by the Internet and Mobile Association of India (IAMAI) is a staggering number. It puts India only second in terms of Internet users after China. Yet, if you see this number from a different…

By |2020-03-26T09:38:55-04:00March 26th, 2020|Cyber safety, Cybersecurity, Digitalization, UPI|Comments Off on How can 1.33 billion people embrace digitalization in an era of damaging malware?

Fake Coronavirus tracking app exploiting our fear and vulnerable social situation

As the Coronavirus spreads across countries creating fear across the globe, everybody wants to stay on top of any information related to it wanting to remain safe and away from infected people. Malware authors are also taking advantage of this situation. Previously on the Android Playstore, there were many applications present  which claimed that they could provide Coronavirus tracking information. But Google has set up some rules for these types of applications and have considered these under the ‘Sensitive events’ category. According to policies from this rule, Google proactively removed many applications from Playstore to stop malware authors to take advantage of this situation. But malware authors have used another way to enter into the user’s phone….

By |2020-03-20T10:47:55-04:00March 20th, 2020|Android, coronavirus, Cybersecurity, ransomware|Comments Off on Fake Coronavirus tracking app exploiting our fear and vulnerable social situation

What to do if your Twitter account has been hacked

Losing access to your account can be stressful, but there are steps you can take to get it back – and to avoid getting hacked again The post What to do if your Twitter account has been hacked appeared first on WeLiveSecurity

By |2020-03-20T06:30:58-04:00March 20th, 2020|Cybersecurity|Comments Off on What to do if your Twitter account has been hacked

Work from home: Improve your security with MFA

Remote work can be much safer with the right cyber‑hygiene practices in place – multi‑factor authentication is one of them The post Work from home: Improve your security with MFA appeared first on WeLiveSecurity

By |2020-03-19T10:30:03-04:00March 19th, 2020|Cybersecurity|Comments Off on Work from home: Improve your security with MFA

Are you secured when dealing with money on your mobile phones?

The sheer convenience of shopping and banking with mobile phones has made it an exceedingly popular device for digital transactions. According to a KPMG report, digital payments are estimated to see a CAGR of 12.7 percent in the number of non-cash transactions by 2021. The growth is being driven by…

By |2020-03-19T03:55:57-04:00March 19th, 2020|Cybersecurity, Mobile Security, Quick Heal, UPI|Comments Off on Are you secured when dealing with money on your mobile phones?

Work from home: How to set up a VPN

As the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks The post Work from home: How to set up a VPN appeared first on WeLiveSecurity

By |2020-03-18T10:30:56-04:00March 18th, 2020|Cybersecurity|Comments Off on Work from home: How to set up a VPN

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

COVID-19 is changing how we work. Weigh in on how your organization is securing its remote footprint with our short Threatpost poll.

By |2020-03-17T17:55:31-04:00March 17th, 2020|best practices, Businesses, Cloud Security, coronavirus, COVID-19, Critical Infrastructure, Cybersecurity, Government, Malware, Mobile Security, ransomware, remote working, schools, telecommuting, Vulnerabilities, Web Security, work from home|Comments Off on A COVID-19 Cybersecurity Poll: Securing a Remote Workforce