π΄ Privacy & Digital-Rights Experts Worry Contact-Tracing Apps Lack Limits π΄
π Read
via "Dark Reading: ".
Mobile-phone-based tracking of people can help fight pandemics, but privacy and security researchers stress that it needs to be done right.π Read
via "Dark Reading: ".
Dark Reading
Privacy & Digital-Rights Experts Worry Contact-Tracing Apps Lack Limits
Mobile-phone-based tracking of people can help fight pandemics, but privacy and security researchers stress that it needs to be done right.
β As if the world couldnβt get any weirder, this AI toilet scans your anus to identify you β
π Read
via "Naked Security".
It's what the researchers call "A mountable toilet system for personalized health monitoring via the analysis of excreta."π Read
via "Naked Security".
Naked Security
As if the world couldnβt get any weirder, this AI toilet scans your anus to identify you
Itβs what the researchers call βA mountable toilet system for personalized health monitoring via the analysis of excreta.β
β Microsoft project proposed to aid Linux IoT code integrity β
π Read
via "Naked Security".
Imagine a computer user from 2010 dreaming of a world in which Microsoft is not only an enthusiastic proponent of open source software but actively contributes to it with its own ideas. The time is now.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Update Firefox again β more RCEs and an Android βtakeoverβ bug too β
π Read
via "Naked Security".
Hot on the heels of Firefox's emergency update over the weekend are the four-weekly fixes that Mozilla had in train already. Get 'em now!π Read
via "Naked Security".
Naked Security
Update Firefox again β more RCEs and an Android βtakeoverβ bug too
Hot on the heels of Firefoxβs emergency update over the weekend are the four-weekly fixes that Mozilla had in train already. Get βem now!
β COVID-19 CISO Checklist for Securing a Remote Workforce β
π Read
via "Threatpost".
The CISO Checklist for Secure Remote Working was built to assist CISOs in navigating through COVID-19, providing them with a concise, high-level list of the absolute essentials needed to ensure their organization is well protected in these challenging times.π Read
via "Threatpost".
Threat Post
COVID-19 CISO Checklist for Securing a Remote Workforce
The CISO Checklist for Secure Remote Working was built to assist CISOs in navigating through COVID-19, to ensure their organization is well-protected.
β βFake Fingerprintsβ Bypass Scanners with 3D Printing β
π Read
via "Threatpost".
New research used 3D printing technology to bypass fingerprint scanners, and tested it against Apple, Samsung and Microsoft mobile products.π Read
via "Threatpost".
Threat Post
βFake Fingerprintsβ Bypass Scanners with 3D Printing
New research used 3D printing technology to bypass fingerprint scanners, and tested it against Apple, Samsung and Microsoft mobile products.
π Talos researchers fabricate a fake that frequently fooled fingerprint locks π
π Read
via "Security on TechRepublic".
The 3D printed duplicates worked on phone and a MacBook Pro laptop but not on Windows machines or two USB jump drives.π Read
via "Security on TechRepublic".
TechRepublic
Talos researchers fabricate a fake that frequently fooled fingerprint locks
The 3D printed duplicates worked on phone and a MacBook Pro laptop but not on Windows machines or two USB jump drives.
β WhatsApp Axes COVID-19 Mass Message Forwarding β
π Read
via "Threatpost".
Amid rampant misinformation, users of the Facebook-owned messaging platform can no longer send coronavirus messages to more than one user at a time.π Read
via "Threatpost".
Threat Post
WhatsApp Axes COVID-19 Mass Message Forwarding
Amid rampant misinformation, users of the Facebook-owned messaging platform can no longer send coronavirus messages to more than one user at a time.
π΄ Why Threat Hunting with XDR Matters π΄
π Read
via "Dark Reading: ".
Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.π Read
via "Dark Reading: ".
Dark Reading
Why Threat Hunting with XDR Matters
Extended detection response technology assumes a breach across all your endpoints, networks, SaaS applications, cloud infrastructure, and any network-addressable resource.
π The seL4 microkernel: Optimized for security and endorsed by the Linux foundation π
π Read
via "Security on TechRepublic".
What is seL4, and what does it mean for the future of connected devices?π Read
via "Security on TechRepublic".
TechRepublic
The seL4 microkernel: Optimized for security and endorsed by the Linux Foundation
What is seL4, and what does it mean for the future of connected devices?
π΄ Accenture Buys Revolutionary Security in Third Acquisition of 2020 π΄
π Read
via "Dark Reading: ".
The deal is intended to strengthen Accenture's critical infrastructure protection capabilities and address more complex IT and OT challenges.π Read
via "Dark Reading: ".
Dark Reading
Accenture Buys Revolutionary Security in Third Acquisition of 2020
The deal is intended to strengthen Accenture's critical infrastructure protection capabilities and address more complex IT and OT challenges.
π Cybercriminals, state-sponsored groups ramping up attacks exploiting COVID-19 pandemic π
π Read
via "Security on TechRepublic".
IntSights researchers surveyed the cyberthreat landscape, finding a wide variety of coronavirus-themed phishing lures, malware infections, network intrusions, scams, and disinformation campaigns.π Read
via "Security on TechRepublic".
TechRepublic
Cybercriminals, state-sponsored groups ramping up attacks exploiting COVID-19 pandemic
IntSights researchers surveyed the cyberthreat landscape, finding a wide variety of coronavirus-themed phishing lures, malware infections, network intrusions, scams, and disinformation campaigns.
π Box unveils new automated malware detection tool for cloud platform π
π Read
via "Security on TechRepublic".
The preview technology and controls will make it easier for IT teams to detect and contain threats before they infect systems, the company says.π Read
via "Security on TechRepublic".
TechRepublic
Box unveils new automated malware detection tool for cloud platform
The preview technology and controls will make it easier for IT teams to detect and contain threats before they infect systems, the company says.
π Cybersecurity prevention can save your company $682K π
π Read
via "Security on TechRepublic".
Ponemon study shows that 82% of attack costs go toward detection, containment, recovery, and remediation.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity prevention can save your company $682K
Ponemon study shows that 82% of attack costs go toward detection, containment, recovery, and remediation.
β Slack in the security spotlight β lessons for collaboration servers β
π Read
via "Naked Security".
Interested in WFH collaration tools right now? Lots of people are - so here's a history lesson to learn from...π Read
via "Naked Security".
Naked Security
Slack in the security spotlight β lessons for collaboration servers
Interested in WFH collaboration tools right now? Lots of people are β so hereβs a history lesson to learn fromβ¦
π New botnet attack "puts other IoT botnets to shame" π
π Read
via "Security on TechRepublic".
Bitdefender warns against this dangerous new IoT "dark_nexus" attack that is innovative and cheap for attackers to acquire.π Read
via "Security on TechRepublic".
TechRepublic
New botnet attack "puts other IoT botnets to shame"
Bitdefender warns against this dangerous new IoT "dark_nexus" attack that is innovative and cheap for attackers to acquire.
β ThreatList: Skype-Themed Apps Hide a Raft of Malware β
π Read
via "Threatpost".
Hundreds of thousands of malware files are disguised as well-known social conferencing and collaboration apps.π Read
via "Threatpost".
Threat Post
ThreatList: Skype-Themed Apps Hide a Raft of Malware
Hundreds of thousands of malware files are disguised as well-known social conferencing and collaboration apps.
π Cybercriminals now using malware and adware to exploit virtual meeting apps π
π Read
via "Security on TechRepublic".
Skype is the most targeted app with 120,000 suspicious files exploiting its name, according to security provider Kaspersky.π Read
via "Security on TechRepublic".
TechRepublic
Cybercriminals now using malware and adware to exploit virtual meeting apps
Skype is the most targeted app with 120,000 suspicious files exploiting its name, according to security provider Kaspersky.
π΄ BEC, Domain Jacking Help Criminals Disrupt Cash Transfers π΄
π Read
via "Dark Reading: ".
The two hacking methods occur independently but are being used in concert to steal funds that are part of online payments and transactions.π Read
via "Dark Reading: ".
Dark Reading
BEC, Domain Jacking Help Criminals Disrupt Cash Transfers
The two hacking methods occur independently but are being used in concert to steal funds that are part of online payments and transactions.
π How to enable the new Eyes Open feature for Google Pixel 4 π
π Read
via "Security on TechRepublic".
Google has finally added the Eyes Open requirement for Google Pixel 4 Face Unlock. Learn how to enable it.π Read
via "Security on TechRepublic".
TechRepublic
How to enable the new Eyes Open feature for Google Pixel 4
Google has finally added the Eyes Open requirement for Google Pixel 4 Face Unlock. Learn how to enable it.