โ EARN IT Act threatens end-to-end encryption โ
๐ Read
via "Naked Security".
The bill, which would undercut Section 230 protections for online publishing, presents itself as a way to stop online child abuse.๐ Read
via "Naked Security".
Naked Security
EARN IT Act threatens end-to-end encryption
The bill, which would undercut Section 230 protections for online publishing, presents itself as a way to stop online child abuse.
๐ Dang... How Did I Miss International Womenโs Day on Sunday, March 8?! ๐
๐ Read
via "Subscriber Blog RSS Feed ".
While there have been some successes when it comes to getting women involved in tech, by and large, we haven't made enough progress.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Dang... How Did I Miss International Womenโs Day on Sunday, March 8?!
While there have been some successes when it comes to getting women involved in tech, by and large, we haven't made enough progress.
๐ด Texas Chose to Fight Ransomware and Not Pay. What About the Rest of Us? ๐ด
๐ Read
via "Dark Reading: ".
๐ Read
via "Dark Reading: ".
Darkreading
Texas Chose to Fight Ransomware and Not Pay. What About the Rest of Us?
Law-abiding folks like us applauded Texas for its bravery โ but would we have the steel will to stand on the side of justice if it happened to us? Probably not.
โ ACLU Sues Over U.S. Airport Facial-Recognition Technology โ
๐ Read
via "Threatpost".
Civil-liberties group wants more transparency about who the government is partnering with and how they are using the information gathered in biometric checks.๐ Read
via "Threatpost".
Threat Post
ACLU Sues Over U.S. Airport Facial-Recognition Technology
Civil-liberties group wants more transparency about who the government is partnering with and how they are using the information gathered in biometric checks.
๐ด A Lesson in Social Engineering ๐ด
๐ Read
via "Dark Reading: ".
What kind of school project is this?๐ Read
via "Dark Reading: ".
Dark Reading
A Lesson in Social Engineering
What kind of school project is this?
ATENTIONโผ New - CVE-2009-5159
๐ Read
via "National Vulnerability Database".
Invision Power Board (aka IPB or IP.Board) 2.x through 3.0.4, when Internet Explorer 5 is used, allows XSS via a .txt attachment.๐ Read
via "National Vulnerability Database".
๐ด Princess Cruises Confirms Data Breach ๐ด
๐ Read
via "Dark Reading: ".
The cruise liner, forced to shut down operations due to coronavirus, says the incident may have compromised passengers' personal data.๐ Read
via "Dark Reading: ".
Darkreading
Princess Cruises Confirms Data Breach
The cruise liner, forced to shut down operations due to coronavirus, says the incident may have compromised passengers' personal data.
๐ด What Cybersecurity Pros Really Think About Artificial Intelligence ๐ด
๐ Read
via "Dark Reading: ".
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.๐ Read
via "Dark Reading: ".
Dark Reading
What Cybersecurity Pros Really Think About Artificial Intelligence
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.
โ Coronavirus-Themed APT Attack Spreads Malware โ
๐ Read
via "Threatpost".
The APT group was spotted sending spear-phishing emails that purport to detail information about coronavirus - but they actually infect victims with a custom RAT.๐ Read
via "Threatpost".
Threat Post
Coronavirus-Themed APT Attack Spreads Malware
The APT group was spotted sending spear-phishing emails that purport to detail information about coronavirus - but they actually infect victims with a custom RAT.
๐ Friday Five: 3/13 ๐
๐ Read
via "Subscriber Blog RSS Feed ".
Ryuk Ransomware targets another U.S. city, University of Kentucky ends a month-long cyberattack, and a secret-sharing app exposes user data - catch up on the week's news with the Friday Five.๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 3/13
Ryuk Ransomware targets another U.S. city, University of Kentucky ends a month-long cyberattack, and a secret-sharing app exposes user data - catch up on the week's news with the Friday Five.
๐ด Beyond Burnout: What Is Cybersecurity Doing to Us? ๐ด
๐ Read
via "Dark Reading: ".
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.๐ Read
via "Dark Reading: ".
Dark Reading
Beyond Burnout: What Is Cybersecurity Doing to Us?
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.
๐ด Big BEC Bust Brings Down Dozens ๐ด
๐ Read
via "Dark Reading: ".
Two dozen individuals have been named in the latest arrests of alleged participants in a business email compromise scheme that cost victims $30 million.๐ Read
via "Dark Reading: ".
Darkreading
Big BEC Bust Brings Down Dozens
Two dozen individuals have been named in the latest arrests of alleged participants in a business email compromise scheme that cost victims $30 million.
โ WordPress Plugin Bug in Popup Builder Threatens 100K Websites โ
๐ Read
via "Threatpost".
The high-severity flaw allows malicious code injection into website pop-up windows.๐ Read
via "Threatpost".
Threat Post
WordPress Plugin Bug in Popup Builder Threatens 100K Websites
The high-severity flaw allows malicious code injection into website pop-up windows.
โ Working from Home: COVID-19โs Constellation of Security Challenges โ
๐ Read
via "Threatpost".
Organizations are sending employees and students home to work and learn -- but implementing the plan opens the door to more attacks, IT headaches and brand-new security challenges.๐ Read
via "Threatpost".
Threat Post
Working from Home: COVID-19โs Constellation of Security Challenges
Organizations are sending employees and students home to work and learn โ but implementing the plan opens the door to more attacks, IT headaches and brand-new security challenges.
๐ด DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile ๐ด
๐ Read
via "Dark Reading: ".
Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons.๐ Read
via "Dark Reading: ".
Darkreading
DDoS Attack Trends Reveal Stronger Shift to IoT, Mobile
Attackers are capitalizing on the rise of misconfigured Internet-connected devices running the WS-Discovery protocol, and mobile carriers are hosting distributed denial-of-service weapons.
๐ How hospital CIOs can prepare for the onslaught of coronavirus patients ๐
๐ Read
via "Security on TechRepublic".
There are steps that IT departments can take to strengthen their technical infrastructure in advance of COVID-19's arrival at their facility.๐ Read
via "Security on TechRepublic".
TechRepublic
How hospital CIOs can prepare for the onslaught of coronavirus patients
There are steps that IT departments can take to strengthen their technical infrastructure in advance of COVID-19's arrival at their facility.
๐ AIEngine 1.9.2 ๐
๐ Go!
via "Security Tool Files โ Packet Storm".
AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.๐ Go!
via "Security Tool Files โ Packet Storm".
Packetstormsecurity
AIEngine 1.9.2 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
โ Monday review โ the hot 23 stories of the week โ
๐ Read
via "Naked Security".
Amazon and eBay shopper data was exposed, and the EARN IT act threatens end-to-end encryption. These stories and more in the weekly roundup.๐ Read
via "Naked Security".
Naked Security
Monday review โ the hot 23 stories of the week
Amazon and eBay shopper data was exposed, and the EARN IT act threatens end-to-end encryption. These stories and more in the weekly roundup.
โ Senate bill would ban TikTok from government phones โ
๐ Read
via "Naked Security".
Concerns over cybersecurity risk and possible spying by China have already brought about bans from DHS, DoD, TSA, and the State Department.๐ Read
via "Naked Security".
Naked Security
Senate bill would ban TikTok from government phones
Concerns over cybersecurity risk and possible spying by China have already brought about bans from DHS, DoD, TSA, and the State Department.
โ Open source bugs have soared in the past year โ
๐ Read
via "Naked Security".
Open source bugs have skyrocketed, according to a report from WhiteSource, with XSS flaws account for a quarter of those bugs.๐ Read
via "Naked Security".
Naked Security
Open source bugs have soared in the past year
Open source bugs have skyrocketed, according to a report from WhiteSource, with XSS flaws account for a quarter of those bugs.