We Live Secruity
- Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan January 28, 2026ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
- Drowning in spam or scam emails? Here’s probably why January 27, 2026Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.
- ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025 January 23, 2026The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
- Children and chatbots: What parents should know January 23, 2026As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
- Common Apple Pay scams, and how to stay safe January 22, 2026Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
- Old habits die hard: 2025’s most common passwords were as predictable as ever January 20, 2026Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
- Why LinkedIn is a hunting ground for threat actors – and how to protect yourself January 16, 2026The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.
- Is it time for internet services to adopt identity verification? January 14, 2026Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
- Your personal information is on the dark web. What happens next? January 13, 2026If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
- Credential stuffing: What it is and how to protect yourself January 8, 2026Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts