β Trojan Raids Android Usersβ Cookie Jars β
π Read
via "Threatpost".
Cookiethief steals cookies to infiltrate Facebook and other web service accounts.π Read
via "Threatpost".
Threat Post
Trojan Raids Android Usersβ Cookie Jars
Cookiethief steals cookies to infiltrate Facebook and other web service accounts.
β Researchers Warn of Novel PXJ Ransomware Strain β
π Read
via "Threatpost".
While PXJ performs typical ransomware functions, it does not appear to share the same underlying code with most known ransomware families.π Read
via "Threatpost".
Threat Post
Researchers Warn of Novel PXJ Ransomware Strain
While PXJ performs typical ransomware functions, it does not appear to share the same underlying code with most known ransomware families.
π Facebook cookie-stealing trojans surface on Android devices π
π Read
via "Security on TechRepublic".
The trojans are designed to gain control of Facebook user accounts by capturing browser cookies in Android, says Kaspersky.π Read
via "Security on TechRepublic".
TechRepublic
Facebook cookie-stealing trojans surface on Android devices
The trojans are designed to gain control of Facebook user accounts by capturing browser cookies in Android, says Kaspersky.
π΄ New Report Shows Breach Costs Continuing to Grow π΄
π Read
via "Dark Reading: ".
The costs associated with data breaches climb alongside the amount of data managed by the enterprise according to the latest Global Protection Index Snapshot.π Read
via "Dark Reading: ".
Dark Reading
New Report Shows Breach Costs Continuing to Grow
The costs associated with data breaches climb alongside the amount of data managed by the enterprise according to the latest Global Protection Index Snapshot.
π΄ Russia-Based Turla APT Group's Infrastructure, Activity Traceable π΄
π Read
via "Dark Reading: ".
Threat actor's practice of using known malware and tactics gives an opening for defenders, says Recorded Future.π Read
via "Dark Reading: ".
Darkreading
Russia-Based Turla APT Group's Infrastructure, Activity Traceable
Threat actor's practice of using known malware and tactics gives an opening for defenders, says Recorded Future.
ATENTIONβΌ New - CVE-2018-20586
π Read
via "National Vulnerability Database".
bitcoind and Bitcoin-Qt prior to 0.17.1 allow injection of arbitrary data into the debug log via an RPC call.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-19516
π Read
via "National Vulnerability Database".
messagepartthemes/default/defaultrenderer.cpp in messagelib in KDE Applications before 18.12.0 does not properly restrict the handling of an http-equiv="REFRESH" value.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-10704
π Read
via "National Vulnerability Database".
yidashi yii2cmf 2.0 has XSS via the /search q parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18350
π Read
via "National Vulnerability Database".
bitcoind and Bitcoin-Qt prior to 0.15.1 have a stack-based buffer overflow if an attacker-controlled SOCKS proxy server is used. This results from an integer signedness error when the proxy server responds with an acknowledgement of an unexpected target domain name.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-3641
π Read
via "National Vulnerability Database".
bitcoind and Bitcoin-Qt prior to 0.10.2 allow attackers to cause a denial of service (disabled functionality such as a client application crash) via an "Easy" attack.π Read
via "National Vulnerability Database".
β Confessions app Whisper spills almost a billion records β
π Read
via "Naked Security".
Researchers say the exposure includes exact locations of users' last posts, nicknames, age, and gender.π Read
via "Naked Security".
Naked Security
Confessions app Whisper spills almost a billion records
Researchers say the exposure includes exact locations of usersβ last posts, nicknames, age, and gender.
β Homeland Security sued over secretive use of face recognition β
π Read
via "Naked Security".
As of June 2019, CBP had processed more than 20 million travelers using facial recognition, civil rights group ACLU says.π Read
via "Naked Security".
Naked Security
Homeland Security sued over secretive use of face recognition
As of June 2019, CBP had processed more than 20 million travelers using facial recognition, civil rights group ACLU says.
β EARN IT Act threatens end-to-end encryption β
π Read
via "Naked Security".
The bill, which would undercut Section 230 protections for online publishing, presents itself as a way to stop online child abuse.π Read
via "Naked Security".
Naked Security
EARN IT Act threatens end-to-end encryption
The bill, which would undercut Section 230 protections for online publishing, presents itself as a way to stop online child abuse.
π Dang... How Did I Miss International Womenβs Day on Sunday, March 8?! π
π Read
via "Subscriber Blog RSS Feed ".
While there have been some successes when it comes to getting women involved in tech, by and large, we haven't made enough progress.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Dang... How Did I Miss International Womenβs Day on Sunday, March 8?!
While there have been some successes when it comes to getting women involved in tech, by and large, we haven't made enough progress.
π΄ Texas Chose to Fight Ransomware and Not Pay. What About the Rest of Us? π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Darkreading
Texas Chose to Fight Ransomware and Not Pay. What About the Rest of Us?
Law-abiding folks like us applauded Texas for its bravery β but would we have the steel will to stand on the side of justice if it happened to us? Probably not.
β ACLU Sues Over U.S. Airport Facial-Recognition Technology β
π Read
via "Threatpost".
Civil-liberties group wants more transparency about who the government is partnering with and how they are using the information gathered in biometric checks.π Read
via "Threatpost".
Threat Post
ACLU Sues Over U.S. Airport Facial-Recognition Technology
Civil-liberties group wants more transparency about who the government is partnering with and how they are using the information gathered in biometric checks.
π΄ A Lesson in Social Engineering π΄
π Read
via "Dark Reading: ".
What kind of school project is this?π Read
via "Dark Reading: ".
Dark Reading
A Lesson in Social Engineering
What kind of school project is this?
ATENTIONβΌ New - CVE-2009-5159
π Read
via "National Vulnerability Database".
Invision Power Board (aka IPB or IP.Board) 2.x through 3.0.4, when Internet Explorer 5 is used, allows XSS via a .txt attachment.π Read
via "National Vulnerability Database".
π΄ Princess Cruises Confirms Data Breach π΄
π Read
via "Dark Reading: ".
The cruise liner, forced to shut down operations due to coronavirus, says the incident may have compromised passengers' personal data.π Read
via "Dark Reading: ".
Darkreading
Princess Cruises Confirms Data Breach
The cruise liner, forced to shut down operations due to coronavirus, says the incident may have compromised passengers' personal data.
π΄ What Cybersecurity Pros Really Think About Artificial Intelligence π΄
π Read
via "Dark Reading: ".
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.π Read
via "Dark Reading: ".
Dark Reading
What Cybersecurity Pros Really Think About Artificial Intelligence
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.