Send in the clones: Facebook cloning revisited

As another confusing message spreads, we look at Facebook privacy, cloning, and hacking. Here’s an edited version of a post about Facebook account cloning I posted last year (2017) which has been getting a lot of hits recently. Heads-up!! Almost every account is being cloned. Your picture and your name are used to create a … More Send in the clones: Facebook cloning revisited

Virus Bulletin 2018: Supply chain hacking grows up

Striking the balance between supply, demand and safety is a major concern. With the pressure to ship as early as possible, especially when it comes to hardware, what assurances do we have that the hardware is really clean, and that future updates won’t be hacked? Here at Virus Bulletin 2018, the conversation of how to … More Virus Bulletin 2018: Supply chain hacking grows up

Week in security with Tony Anscombe

The first week in security video round-up from WeLiveSecurity. Welcome to the first ever week in security video round-up. This weekly video will bring you some of the biggest industry news that we have covered here on WeLiveSecurity. The videos will be presented by ESET’s Global Security Expert & Industry Ambassador Tony Anscombe. In this week’s cybersecurity … More Week in security with Tony Anscombe

Australian schoolboy hacks into Apple’s network, steals files

His lawyer claims that the teen did the hacking because he admired Apple and dreamed of landing a job in the company. A 16-year-old Australian teenager has broken into Apple’s internal systems multiple times, making off with 90GB of “secure files” and accessing customer accounts in the process, according to The Age, which cited court proceedings. … More Australian schoolboy hacks into Apple’s network, steals files

Black Hat: Protecting Industrial Control System

Aiming to protect critical infrastructure against attacks. Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days. While industrial control protocols themselves are horribly insecure, there is … More Black Hat: Protecting Industrial Control System