Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

We Live Security » Languages » English

Get the latest updates from We Live Security » Languages » English directly as they happen.

Follow now 611 followers

Latest posts

Last updated about 3 hours ago

Common Apple Pay scams, and how to stay safe

1 day ago

Here’s how the most common scams targeting Apple Pay users work and...

Old habits die hard: 2025’s most common passwords were as predictable as ever

3 days ago

Once again, data shows an uncomfortable truth: the habit of choosing eminently...

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

7 days ago

The business social networking site is a vast, publicly accessible database of...

Is it time for internet services to adopt identity verification?

9 days ago

Should verified identities become the standard online? Australia’s social media ban for...

Your personal information is on the dark web. What happens next?

10 days ago

If your data is on the dark web, it’s probably only a...

Credential stuffing: What it is and how to protect yourself

15 days ago

Reusing passwords may feel like a harmless shortcut – until a single...

This month in security with Tony Anscombe – December 2025 edition

25 days ago

As 2025 draws to a close, Tony looks back at the cybersecurity...

A brush with online fraud: What are brushing scams and how do I stay safe?

about 1 month ago

Have you ever received a package you never ordered? It could be...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

about 1 month ago

A comprehensive analysis and assessment of a critical severity vulnerability with low...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

about 1 month ago

ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy...

ESET Threat Report H2 2025

about 1 month ago

A view of the H2 2025 threat landscape as seen by ESET...

Black Hat Europe 2025: Was that device designed to be on the internet at all?

about 1 month ago

Behind the polished exterior of many modern buildings sit outdated systems with...