π΄ Cisco Reports SIP Inspection Vulnerability π΄
π Read
via "Dark Reading: ".
Advisory addresses active exploitation of vuln in the wild, with no clear solution in sight.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ NITTF Releases New Model for Insider Threat Program π΄
π Read
via "Dark Reading: ".
The Insider Threat Program Maturity Framework is intended to help government agencies strengthen their programs.π Read
via "Dark Reading: ".
Darkreading
NITTF Releases New Model for Insider Threat Program
The Insider Threat Program Maturity Framework is intended to help government agencies strengthen their programs.
π΄ Ex-Employees Allegedly Steal Micron Trade Secrets Valued At Over $400 Million π΄
π Read
via "Dark Reading: ".
Three individuals who worked for DRAM maker's Taiwan subsidiary stole Micron IP to benefit company controlled by China's government, US says in indictment.π Read
via "Dark Reading: ".
Dark Reading
Ex-Employees Allegedly Steal Micron Trade Secrets Valued At Over $400 Million
Three individuals who worked for DRAM maker's Taiwan subsidiary stole Micron IP to benefit company controlled by China's government, US says in indictment.
β Facebook Blames Malicious Extensions in Breach of 81K Private Messages β
π Read
via "The first stop for security news | Threatpost ".
Investigators posed as buyers and were offered the messages at 10 cents per Facebook account.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Facebook Blames Malicious Extensions in Breach of 81K Private Messages
Investigators posed as buyers and were offered the messages at 10 cents per Facebook account.
π΄ Worst Malware and Threat Actors of 2018 π΄
π Read
via "Dark Reading: ".
Two reports call out the most serious malware attacks and attackers of the year (so far).π Read
via "Dark Reading: ".
Darkreading
Worst Malware and Threat Actors of 2018
Two reports call out the most serious malware attacks and attackers of the year (so far).
β Monday review β the hot 22 stories of the week β
π Read
via "Naked Security".
Passcodes are protected by the Fifth Amendment, browsers are being made to cough up browsing history, and an exploit in Microsoft Word. Catch up with this and everything we wrote in the last seven days - it's weekly roundup time!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β PortSmash attack steals secrets from Intel chips on the side β
π Read
via "Naked Security".
Researchers have developed an exploit that uses a feature in Intel chips to steal secret cryptographic keys.π Read
via "Naked Security".
Naked Security
PortSmash attack steals secrets from Intel chips on the side
Researchers have developed an exploit that uses a feature in Intel chips to steal secret cryptographic keys.
β Should company bosses face jail for mishandling your privacy? β
π Read
via "Naked Security".
A proposed bill calls for executives to be jailed for not protecting consumers' data, or at least for lying about it.π Read
via "Naked Security".
Naked Security
Should company bosses face jail for mishandling your privacy?
A proposed bill calls for executives to be jailed for not protecting consumersβ data, or at least for lying about it.
β FIFA, hacked again, is leaking like a sieve β
π Read
via "Naked Security".
Football shockers started to flow on Friday, after journalists analyzed more than 70m exfiltrated documents, totaling 3.4 terabytes of data.π Read
via "Naked Security".
Naked Security
FIFA, hacked again, is leaking like a sieve
Football shockers started to flow on Friday, after journalists analyzed more than 70m exfiltrated documents, totaling 3.4 terabytes of data.
β Private Facebook data from 81,000 accounts discovered on crime forum β
π Read
via "Naked Security".
Stolen data from the 81,000 accounts that appeared to be genuine included intimate exchanges between Facebook users.π Read
via "Naked Security".
Naked Security
Private Facebook data from 81,000 accounts discovered on crime forum
Stolen data from the 81,000 accounts that appeared to be genuine included intimate exchanges between Facebook users.
π How big data can help identify and motivate voters π
π Read
via "Security on TechRepublic".
Chris Wilson of WPA Intelligence explains how data analytics experts could help increase voter turnout.π Read
via "Security on TechRepublic".
TechRepublic
How big data can help identify and motivate voters
Chris Wilson of WPA Intelligence explains how data analytics experts could help increase voter turnout.
π Why the Facebook/Cambridge Analytica scandal makes connecting with voters more difficult π
π Read
via "Security on TechRepublic".
Chris Wilson of WPA Intelligence reflects on why he thinks the Facebook/Cambridge Analytica incident makes it more difficult to reach voters.π Read
via "Security on TechRepublic".
TechRepublic
Why the Facebook/Cambridge Analytica scandal makes connecting with voters more difficult
Chris Wilson of WPA Intelligence reflects on why he thinks the Facebook/Cambridge Analytica incident makes it more difficult to reach voters.
π Election security: Tuesday and beyond π
π Read
via "Security on TechRepublic".
CNET senior producer Dan Patterson explains hacking threats for Tuesday's elections.π Read
via "Security on TechRepublic".
TechRepublic
Election security: Tuesday and beyond
CNET senior producer Dan Patterson explains hacking threats for Tuesday's elections.
π΄ After the Breach: Tracing the 'Smoking Gun' π΄
π Read
via "Dark Reading: ".
Systems, technology, and threats change, and your response plan should, too. Here are three steps to turn your post-breach assessment into a set of workable best practices.π Read
via "Dark Reading: ".
Darkreading
After the Breach: Tracing the 'Smoking Gun'
Systems, technology, and threats change, and your response plan should, too. Here are three steps to turn your post-breach assessment into a set of workable best practices.
π Election security: US voting system faces multiple cyber threats during 2018 midterms π
π Read
via "Security on TechRepublic".
From social media manipulation to voting machine hacks, CNET senior producer Dan Patterson explains the cyber threats that could compromise the 2018 U.S. midterm elections.π Read
via "Security on TechRepublic".
TechRepublic
Election security: US voting system faces multiple cyber threats during 2018 midterms
From social media manipulation to voting machine hacks, CNET senior producer Dan Patterson explains the cyber threats that could compromise the 2018 U.S. midterm elections.
π Why you should be using a password manager π
π Read
via "Security on TechRepublic".
Jack Wallen discusses why everyone should be using a password manager.π Read
via "Security on TechRepublic".
π How automation can fill the enterprise cybersecurity skills gap π
π Read
via "Security on TechRepublic".
Automation is the way that teams gain a humongous amount of leverage in the speed and effectiveness of cyberdefense, says LogicHub CEO and co-founder Kumar Saurabh.π Read
via "Security on TechRepublic".
TechRepublic
How automation can fill the enterprise cybersecurity skills gap
Automation is the way that teams gain a humongous amount of leverage in the speed and effectiveness of cyberdefense, says LogicHub CEO and co-founder Kumar Saurabh.
π΄ Smart City Security Testing: Research -> Tooling -> Methodology -> Go! π΄
π Read
via "Dark Reading: ".
The idea and concept of Smart Cities is certainly gaining traction. Cities around the world are already investing in trials, testbeds and in many cases operational system deployments such as smart energy, smart lighting, smart parking; the list goes on...π Read
via "Dark Reading: ".
Dark Reading
Smart City Security Testing: Research -> Tooling -> Methodology -> Go!
The idea and concept of Smart Cities is certainly gaining traction. Cities around the world are already investing in trials, testbeds and in many cases operational system deployments such as smart energy, smart lighting, smart parking; the list goes on...
β Passwords: Here to Stay, Despite Smart Alternatives? β
π Read
via "The first stop for security news | Threatpost ".
"Password-killing" authentication efforts may be on a road to nowhere.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Passwords: Here to Stay, Despite Smart Alternatives?
βPassword-killingβ authentication efforts may be on a road to nowhere.
β PortSmash Side-Channel Attack Siphons Data From Intel, Other CPUs β
π Read
via "The first stop for security news | Threatpost ".
An exploit was released for a flaw existing in a process in CPUs called Simultaneous Multithreading (SMT).π Read
via "The first stop for security news | Threatpost ".
Threat Post
PortSmash Side-Channel Attack Siphons Data From Intel, Other CPUs
An exploit was released for a flaw existing in a process in CPUs called Simultaneous Multithreading (SMT).
β Newsmaker Interview: Tom Kellermann on Hacking the Midterm Elections β
π Read
via "The first stop for security news | Threatpost ".
Concerns over midterm election tampering reach a boiling point in the days leading up to actual voting.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Newsmaker Interview: Tom Kellermann on Hacking the Midterm Elections
Concerns over midterm election tampering reach a boiling point in the days leading up to actual voting.