Livewire Blog

What is ambient computing and why does it matter to you?
  • 14
    Aug

What is ambient computing and why does it matter to you?

Ambient computing is a term that we are hearing more often lately. But what is it and why does it matter? To understand ambient computing we must first understand the Internet of Things (IoT). IoT refers to the interconnected array of computing devices, objects, and machines with unique identifiers that are capable of transferring data over a network...

Read More
What's the difference between an antivirus and anti-malware?
  • 6
    Jul

What’s the difference between an antivirus and anti-malware?

So you've read somewhere online about malware and viruses, but just what are they and what are the differences between antivirus and anti-malware products? Two major types of protection for Windows (and PC owners in general) are an antivirus and anti-malware suites. These software solutions offer measures to help keep OS installations secured from attack, be it from...

Read More
What’s the difference between WannaCry and Petya ransomware?
  • 5
    Jul

What’s the difference between WannaCry and Petya ransomware?

If you’ve been off the grid for some time and somehow managed to skip on all the fuzz about WannaCry and Petya ransomware, we prepared a brief explanation about the subject and enlisted the main differences between Petya (sometimes called GoldenEye) and already restrained WannaCry malicious software. In the era where computers are governing so many economic, industrial,...

Read More
Vaccine, not Killswitch, Found for Petya (NotPetya) Ransomware Outbreak
  • 28
    Jun

Vaccine, not Killswitch, Found for Petya (NotPetya) Ransomware Outbreak

Cybereason security researcher Amit Serper has found a way to prevent the Petya (NotPetya/SortaPetya/Petna) ransomware from infecting computers. The ransomware has been wreaking havoc across the globe today, locking hard drive MFT and MBR sections and preventing computers from booting. Unless victims opted to pay a ransom (which is now pointless and not recommended), there was no way to...

Read More
Pwn2Own hacking contest ends with two virtual machine escapes
  • 28
    Jun

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system. Virtual machines are in used in many scenarios to create throw-away environments that pose no threat to the main operating system in case of compromise. For...

Read More
WatchGuard Firebox with Total Security Suite Blocks WannaCry – Are your End-users Protected?
  • 18
    May

WatchGuard Firebox with Total Security Suite Blocks WannaCry – Are your End-users Protected?

WannaCry ransomware is the latest advanced threat to take unprotected organizations around the globe hostage. The good news? WatchGuard Total Security Suite successfully blocks this threat, protecting customers from losing data, time, and their reputation. It is our goal that all WatchGuard customers and prospects understand the severity of this threat and how to protect against it. As...

Read More
GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation
  • 13
    Apr

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

GoDaddy, one of the world's largest domain registrars and certificate authorities, revoked almost 9,000 SSL certificates this week after it learned that its domain validation system has had a serious bug for the past five months... read full article

Read More
Inferring passwords using WiFi signals – Hacking passwords over WiFi
  • 12
    Apr

Inferring passwords using WiFi signals – Hacking passwords over WiFi

It seems that almost everything is breakable when it comes to security on the Internet. We’ve seen even the best security systems having one or more flaws that can be exploited for the hackers’ benefit. No, some professors across three universities have now demonstrated that using banking passwords over WiFi is not safe anymore. They came up with...

Read More
Australian Department of Human Services achieves full Windows 10 deployment
  • 16
    Mar

Australian Department of Human Services achieves full Windows 10 deployment

More of Australian citizens can now get a faster and more personal access to Windows 10 services. Microsoft Consulting Services and Windows team together with Australia’s Department of Human Services recently achieved full Windows 10 deployment for its 35,000 employees in less than a year. This is reportedly the largest commercial deployment of Windows 10 in the Asia-Pacific...

Read More
A USB dongle can hijack all your Web accounts and router in 30 seconds, even if your computer is locked
  • 28
    Feb

A USB dongle can hijack all your Web accounts and router in 30 seconds, even if your computer is locked

A proof of concept from security researcher and software developer Samy Kamkar shows that macOS, Windows, and Linux computers can have any previously active Web logins hijacked merely by plugging in a tiny Unix device via USB or Thunderbolt, even if the computer is locked and password protected, and possibly even when it seems to be asleep. It...

Read More