A sea of sensors will soon influence almost everything in your world

The post CES 2022: More sensors than people appeared first on WeLiveSecurity

From social engineering to looking over your shoulder, here are some of the most common tricks that bad guys use to steal passwords

The post 5 ways hackers steal passwords (and how to stop them) appeared first on WeLiveSecurity

How can you help your kids navigate Instagram safely? Here are a few tips to help you protect their privacy on the app.

The post Instagram and teens: A quick guide for parents to keep their kids safe appeared first on WeLiveSecurity

Be alert, be proactive and break these 10 bad habits to improve your cyber-hygiene in 2022

The post Breaking the habit: Top 10 bad cybersecurity habits to shed in 2022 appeared first on WeLiveSecurity

As we usher in the New Year, let’s take a look at some statistics that will help you stay up-to-date on recent cybersecurity trends

The post 22 cybersecurity statistics to know for 2022 appeared first on WeLiveSecurity

As we close out another year like no other, let’s look back at some of the most notable cybersecurity stories that shaped 2021

The post 2021 in review: The biggest cybersecurity stories of the year appeared first on WeLiveSecurity

Don’t leave your kids to their own devices – give them a head start with staying safe online instead

The post This holiday season, give your children the gift of cybersecurity awareness appeared first on WeLiveSecurity

As you down tools for the holiday season, be sure to also switch off the standby lights – it’s both cost effective and better for the environment

The post Don’t forget to unplug your devices before you leave for the holidays! appeared first on WeLiveSecurity

Like many other companies, we’re closely following the multiple CVEs regarding Apache Log4j 2. Our security teams are investigating any potential impact on Google products and services and are focused on protecting our users and customers.

We encourage anyone who manages environments containing Log4j 2 to update to the latest version.

Based on findings in our ongoing investigations, here is our list of product and service updates as of December 17th (CVE-2021-44228 & CVE-2021-45046):

Android is not aware of any impact to the Android Platform or Enterprise. At this time, no update is required for this specific vulnerability, but we encourage our customers to ensure that the latest security updates are applied to their devices.

Chrome OS  releases and infrastructure are not using versions of Log4j affected by the vulnerability.

Chrome Browser releases, infrastructure and admin console are not using versions of Log4j affected by the vulnerability.

Google Cloud has a specific advisory dedicated to updating customers on the status of GCP and Workspace products and services.

Google Marketing Platform, including Google Ads is not using versions of Log4j affected by the vulnerability. This includes Display & Video 360, Search Ads 360, Google Ads, Analytics (360 and free), Optimize 360, Surveys 360 & Tag Manager 360.

YouTube  is not using versions of Log4j affected by the vulnerability.

We will continue to update this advisory with the latest information.

Why the vulnerability in Log4j poses a grave threat – What businesses should know about Log4Shell – ESET wraps up a series of deep-dives into Latin American banking trojans

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity