β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From the 'Martinelli' WhatsApp hoax to Facebook wanting to give your name to the weirdo next to you, and everything in between. Catch up with this and everything we wrote in the last seven days - it's weekly roundup time!π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
From the βMartinelliβ WhatsApp hoax to Facebook wanting to give your name to the weirdo next to you, and everything in between. Catch up with this and everything we wrote in the last seβ¦
β Microsoft mistake leaves Windows 10 users fuming β
π Read
via "Naked Security".
Microsoft Windows 10 users were livid late last week after Microsoft mistakenly told them that their licenses were invalid.π Read
via "Naked Security".
β Terrorists told to hijack social media accounts to spread propaganda β
π Read
via "Naked Security".
Facebook has removed 14 million pieces of content dubbed likely to come from terrorists, as determined by new machine learning technologyπ Read
via "Naked Security".
Naked Security
Terrorists told to hijack social media accounts to spread propaganda
Facebook has removed 14 million pieces of content dubbed likely to come from terrorists, as determined by new machine learning technology
β Botnet pwns 100,000 routers using ancient security flaw β
π Read
via "Naked Security".
Researchers have stumbled on another large botnet thatβs been hijacking home routers while nobody was paying attention.π Read
via "Naked Security".
Naked Security
Botnet pwns 100,000 routers using ancient security flaw
Researchers have stumbled on another large botnet thatβs been hijacking home routers while nobody was paying attention.
β Headmaster fired over cryptocoin mining on the schoolβs dime β
π Read
via "Naked Security".
O, that constant whirring noise? And the sky-high electricity bill? Why, it's those darn air conditioners and heaters!π Read
via "Naked Security".
Naked Security
Headmaster fired over cryptocoin mining on the schoolβs dime
O, that constant whirring noise? And the sky-high electricity bill? Why, itβs those darn air conditioners and heaters!
π΄ 'CARTA': A New Tool in the Breach Prevention Toolbox π΄
π Read
via "Dark Reading: ".
Gartner's continuous adaptive risk and trust assessment for averting a data breach addresses the shortcomings of static security programs.π Read
via "Dark Reading: ".
Darkreading
'CARTA': A New Tool in the Breach Prevention Toolbox
Gartner's continuous adaptive risk and trust assessment for averting a data breach addresses the shortcomings of static security programs.
β New Boom in Facial Recognition Tech Prompts Privacy Alarms β
π Read
via "Threatpost | The first stop for security news".
Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn.π Read
via "Threatpost | The first stop for security news".
Threat Post
New Boom in Facial Recognition Tech Prompts Privacy Alarms
Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn.
β Malware-Laced App Lurked on Google Play For a Year β
π Read
via "Threatpost | The first stop for security news".
Google Playβs policy prohibits apps or SDKs that download executable code, such as dex files or native code, from a source other than Google Playπ Read
via "Threatpost | The first stop for security news".
Threat Post
Malware-Laced App Lurked on Google Play For a Year
Google Playβs policy prohibits apps or SDKs that download executable code, such as dex files or native code, from a source other than Google Play
β How to fit all of Shakespeare in one tweet (and why not to do it!) β
π Read
via "Naked Security".
A security researcher squoze 1,299,999 words into a single tweet, thanks to image metadata that Twitter doesn't remove.π Read
via "Naked Security".
Naked Security
How to fit all of Shakespeare in one tweet (and why not to do it!)
A security researcher squoze 1,299,999 words into a single tweet, thanks to image metadata that Twitter doesnβt remove.
β U.S. Chip Cards Are Being Compromised in the Millions β
π Read
via "Threatpost | The first stop for security news".
A full 60 million U.S. cards were compromised in the past 12 months. While 93 percent of those were EMV chip-enabled, merchants continued to use mag stripes.π Read
via "Threatpost | The first stop for security news".
Threat Post
U.S. Chip Cards Are Being Compromised in the Millions
A full 60 million U.S. cards were compromised in the past 12 months. Of those, 93 percent were EMV chip-enabled β but merchants continue to use mag stripes.
π How CIOs can manage blockchain security: 4 tips π
π Read
via "Security on TechRepublic".
By 2020, an exploited vulnerability will disrupt a major blockchain platform, causing significant damage, Gartner predicts. Here's how to protect your blockchain efforts.π Read
via "Security on TechRepublic".
TechRepublic
How CIOs can manage blockchain security: 4 tips
By 2020, an exploited vulnerability will disrupt a major blockchain platform, causing significant damage, Gartner predicts. Here's how to protect your blockchain efforts.
π How--and why--you should enable Housekeeping in Elementary OS Juno π
π Read
via "Security on TechRepublic".
Elementary OS Juno includes a number of improvements and additions, including a slight security bump over previous releases.π Read
via "Security on TechRepublic".
TechRepublic
How--and why--you should enable Housekeeping in Elementary OS Juno
Elementary OS Juno includes a number of improvements and additions, including a slight security bump over previous releases.
π΄ Cyberattacks Top Business Risks in North America, Europe, EAP π΄
π Read
via "Dark Reading: ".
The World Economic Forum reports cyberattacks are a top enterprise concern following WannaCry and the rise of e-commerce.π Read
via "Dark Reading: ".
Darkreading
Cyberattacks Top Business Risks in North America, Europe, EAP
The World Economic Forum reports cyberattacks are a top enterprise concern following WannaCry and the rise of e-commerce.
π΄ 7 Cool New Security Tools to be Revealed at Black Hat Europe π΄
π Read
via "Dark Reading: ".
Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.π Read
via "Dark Reading: ".
Darkreading
7 Cool New Security Tools to be Revealed at Black Hat Europe
Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.
π΄ Veterans Find New Roles in Enterprise Cybersecurity π΄
π Read
via "Dark Reading: ".
Facebook and Synack create programs to educate vets and grow employment opportunities while shrinking the cybersecurity talent gap.π Read
via "Dark Reading: ".
Darkreading
Veterans Find New Roles in Enterprise Cybersecurity
Facebook and Synack create programs to educate vets and grow employment opportunities while shrinking the cybersecurity talent gap.
π΄ Paris Agreement on Cybercrime Falls Short of Unanimous Agreement π΄
π Read
via "Dark Reading: ".
More than 50 nations and 150 global companies agree to join effort to fight cybercrime.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Emotet Campaign Ramps Up with Mass Email Harvesting Module β
π Read
via "Threatpost | The first stop for security news".
The new variant can exfiltrate emails for a period going back 180 days, en masse.π Read
via "Threatpost | The first stop for security news".
Threat Post
Emotet Campaign Ramps Up with Mass Email Harvesting Module
The new variant can exfiltrate emails for a period going back 180 days, en masse.
π β4 best practices to combat new IoT security threats at the firmware level π
π Read
via "Security on TechRepublic".
Firmware may be the next frontier for IoT hacks. See below how the healthcare industry addresses these threats.π Read
via "Security on TechRepublic".
TechRepublic
β4 best practices to combat new IoT security threats at the firmware level
Firmware may be the next frontier for IoT hacks. See below how the healthcare industry addresses these threats.
π΄ 2018 On Track to Be One of the Worst Ever for Data Breaches π΄
π Read
via "Dark Reading: ".
A total of 3,676 breaches involving over 3.6 billion records were reported in the first nine months of this year alone.π Read
via "Dark Reading: ".
Darkreading
2018 on Track to Be One of the Worst Ever for Data Breaches
A total of 3,676 breaches involving over 3.6 billion records were reported in the first nine months of this year alone.
β Does wiping your iPhone count as destroying evidence? β
π Read
via "Naked Security".
Police say it's a felony, but a woman arrested in connection with a drive-by shooting says she doesn't even know how to remotely wipe.π Read
via "Naked Security".
Naked Security
Does wiping your iPhone count as destroying evidence?
Police say itβs a felony, but a woman arrested in connection with a drive-by shooting says she doesnβt even know how to remotely wipe.
π Ransomware no. 1 cyberthreat to SMBs, and the average attack costs $47K π
π Read
via "Security on TechRepublic".
More than half of SMBs experienced a ransomware attack in the first half of 2018, according to a Datto report.π Read
via "Security on TechRepublic".
TechRepublic
Ransomware no. 1 cyberthreat to SMBs, and the average attack costs $47K
More than 55% of MSPs said their clients experienced a ransomware attack in the first six months of 2018, according to a Datto report.