π Data security: 5 problems and solutions π
π Read
via "Security on TechRepublic".
When it comes to securing data, most enterprises are negligent and unaware, according to a Lepide report.π Read
via "Security on TechRepublic".
TechRepublic
Data security: 5 problems and solutions
When it comes to securing data, most enterprises are negligent and unaware, according to a Lepide report.
β Have I Been Pwned No Longer For Sale β
π Read
via "Threatpost".
Troy Hunt said the popular HIBP will continue to be run as an independent service.π Read
via "Threatpost".
Threat Post
Have I Been Pwned No Longer For Sale
Troy Hunt said the popular HIBP will continue to be run as an independent service.
π Golden Frieza π
π Go!
via "Security Tool Files β Packet Storm".
Imagine finding yourself in a "hostile" environment, one where you cannot run exploits, tools, and applications without worrying about prying eyes spying on you, be they a legitimate system administrator, a colleague sharing an access with you or a software solution that scans the machine you are logged in to for malicious files. Your binary should live in encrypted form in the filesystem so that no static analysis would be possible even if identified and copied somewhere else. It should be only decrypted on the fly in memory when executed, so preventing dynamic analysis too, unless the decryption key is known. To experiment with such an idea Red Timmy Sec have created the "golden frieza" project.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Golden Frieza β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Why βfreeβ Wi-Fi isnβt really free β
π Read
via "Naked Security".
How much data is too much to give away to get online while you're waiting at the train station? In the airport? A shopping mall?π Read
via "Naked Security".
Naked Security
Why βfreeβ Wi-Fi isnβt really free
How much data is too much to give away to get online while youβre waiting at the train station? In the airport? A shopping mall?
π΄ Former Microsoft Software Engineer Convicted of Fraud π΄
π Read
via "Dark Reading: ".
The 25-year-old was convicted of 18 charges stemming from illegal access to money stored in online gift cards.π Read
via "Dark Reading: ".
Darkreading
Former Microsoft Software Engineer Convicted of Fraud
The 25-year-old was convicted of 18 charges stemming from illegal access to money stored in online gift cards.
π΄ NSS Labs Revises Endpoint Security Test Model π΄
π Read
via "Dark Reading: ".
New product ratings system comes amid growing shift in the testing market toward more "open and transparent" evaluation of security tools.π Read
via "Dark Reading: ".
Dark Reading
NSS Labs Revises Endpoint Security Test Model
New product ratings system comes amid growing shift in the testing market toward more open and transparent evaluation of security tools.
β MediaTek Bug Actively Exploited, Affects Millions of Android Devices β
π Read
via "Threatpost".
An exploit published by a developer is easy to use and has already been used to build malicious apps that gain root access on Android devices.π Read
via "Threatpost".
Threat Post
MediaTek Bug Actively Exploited, Affects Millions of Android Devices
An exploit published by a developer is easy to use and has already been used to build malicious apps that gain root access on Android devices.
π 7 security tips for IoT systems π
π Read
via "Security on TechRepublic".
Security risks are important considerations with IoT initiatives. A Kaspersky report includes steps to take to prevent an IoT-targeted attack.π Read
via "Security on TechRepublic".
TechRepublic
7 security tips for IoT systems
Security risks are important considerations with IoT initiatives. A Kaspersky report includes steps to take to prevent an IoT-targeted attack.
π΄ With New SOL4Ce Lab, Purdue U. and DoE Set Sights on National Security π΄
π Read
via "Dark Reading: ".
The cooperative research initiative brings together faculty and students to "focus on problems and cutting-edge ways to solve them."π Read
via "Dark Reading: ".
Dark Reading
With New SOL4Ce Lab, Purdue U. and DoE Set Sights on National Security
The cooperative research initiative brings together faculty and students to focus on problems and cutting-edge ways to solve them.
π΄ Avoiding the Perils of Electronic Communications π΄
π Read
via "Dark Reading: ".
Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That's why an agile communications strategy is so important.π Read
via "Dark Reading: ".
Dark Reading
Avoiding the Perils of Electronic Communications
Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That's why an agile communications strategy is so important.
π Govt Contractors Allege Air Force Stole IP, Proprietary Data π
π Read
via "Subscriber Blog RSS Feed ".
Two contractors claim the U.S. Air Force took their proprietary data and used it to develop, market, and sell their own version of a storage tank used by planes to fight fires.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Govt Contractors Allege Air Force Stole IP, Proprietary Data
Two contractors claim the U.S. Air Force took their proprietary data and used it to develop, market, and sell their own version of a storage tank used by planes to fight fires.
β Letβs Encrypt to Revoke Millions of TLS Certs β
π Read
via "Threatpost".
On Wednesday millions of Transport Layer Security certificates will be revoked because of a Certificate Authority Authorization bug.π Read
via "Threatpost".
Threat Post
Letβs Encrypt to Revoke Millions of TLS Certs
On Wednesday millions of Transport Layer Security certificates will be revoked because of a Certificate Authority Authorization bug.
β Cobalt Ulster Strikes Again With New ForeLord Malware β
π Read
via "Threatpost".
Threatpost talks to Alex Tilley, senior security researcher with Dell SecureWorks' Counter Threat Unit Research Team, about a recently discovered campaign linked to an Iranian APT.π Read
via "Threatpost".
Threat Post
Cobalt Ulster Strikes Again With New ForeLord Malware
Threatpost talks to Alex Tilley, senior security researcher with Dell SecureWorks' Counter Threat Unit Research Team, about a recently discovered campaign linked to an Iranian APT.
π΄ Gotta Patch 'Em All? Not Necessarily, Experts Say π΄
π Read
via "Dark Reading: ".
When it's impossible to remediate all vulnerabilities in an organization, data can indicate which bugs should be prioritized.π Read
via "Dark Reading: ".
Darkreading
Gotta Patch 'Em All? Not Necessarily, Experts Say
When it's impossible to remediate all vulnerabilities in an organization, data can indicate which bugs should be prioritized.
π Almost half of mobile malware are hidden apps π
π Read
via "Security on TechRepublic".
Cybercriminals are finding new ways to get malware on mobile devices, including abusing Android's accessibility features, according to a McAfee report.π Read
via "Security on TechRepublic".
TechRepublic
Almost half of mobile malware are hidden apps
Cybercriminals are finding new ways to get malware on mobile devices, including abusing Android's accessibility features, according to a McAfee report.
β Facebook purges hundreds of fake accounts from state actors, marketers β
π Read
via "Naked Security".
It removed 5 networks engaged in foreign or government interference in Egypt, India, Russia, Iran, and Myanmar/Vietnam. Some targeted the US.π Read
via "Naked Security".
Naked Security
Facebook purges hundreds of fake accounts from state actors, marketers
It removed 5 networks engaged in foreign or government interference in Egypt, India, Russia, Iran, and Myanmar/Vietnam. Some targeted the US.
β Tech support scammers hacked back by vigilante β
π Read
via "Naked Security".
A cybercrime vigilante was so incensed by tech support scammers, he reverse-hacked the Indian call centre to spy on his would-be attackers.π Read
via "Naked Security".
Naked Security
Tech support scammers hacked back by vigilante
A cybercrime vigilante was so incensed by tech support scammers, he reverse-hacked the Indian call centre to spy on his would-be attackers.
β Google fixes MediaTek bug in Android March patches β
π Read
via "Naked Security".
There are patches for over 70 bugs, and they finally fixed a months-old exploit for MediaTek chipsets, said to affect millions of devices.π Read
via "Naked Security".
Naked Security
Google fixes MediaTek bug in Android March patches
There are patches for over 70 bugs, and they finally fixed a months-old exploit for MediaTek chipsets, said to affect millions of devices.
β NCSC: Secure your webcams now β
π Read
via "Naked Security".
We don't want to see what you do behind closed doors, but lots of hackers would be happy to pull up a chair to view that video stream.π Read
via "Naked Security".
Naked Security
NCSC: Secure your webcams now
We donβt want to see what you do behind closed doors, but lots of hackers would be happy to pull up a chair to view that video stream.
π΄ 7 Loyalty Program and Rewards App Attacks π΄
π Read
via "Dark Reading: ".
The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights.π Read
via "Dark Reading: ".
Dark Reading
7 Loyalty Program and Rewards App Attacks
The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights.
π 4 essential things security experts do to protect their own data π
π Read
via "Security on TechRepublic".
Learn from the experts what it takes to keep hackers away from your personal data.π Read
via "Security on TechRepublic".
TechRepublic
4 essential things security experts do to protect their own data
Learn from the experts what it takes to keep hackers away from your personal data.