π How--and why--you should enable Housekeeping in Elementary OS Juno π
π Read
via "Security on TechRepublic".
Elementary OS Juno includes a number of improvements and additions, including a slight security bump over previous releases.π Read
via "Security on TechRepublic".
TechRepublic
How--and why--you should enable Housekeeping in Elementary OS Juno
Elementary OS Juno includes a number of improvements and additions, including a slight security bump over previous releases.
π΄ Cyberattacks Top Business Risks in North America, Europe, EAP π΄
π Read
via "Dark Reading: ".
The World Economic Forum reports cyberattacks are a top enterprise concern following WannaCry and the rise of e-commerce.π Read
via "Dark Reading: ".
Darkreading
Cyberattacks Top Business Risks in North America, Europe, EAP
The World Economic Forum reports cyberattacks are a top enterprise concern following WannaCry and the rise of e-commerce.
π΄ 7 Cool New Security Tools to be Revealed at Black Hat Europe π΄
π Read
via "Dark Reading: ".
Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.π Read
via "Dark Reading: ".
Darkreading
7 Cool New Security Tools to be Revealed at Black Hat Europe
Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.
π΄ Veterans Find New Roles in Enterprise Cybersecurity π΄
π Read
via "Dark Reading: ".
Facebook and Synack create programs to educate vets and grow employment opportunities while shrinking the cybersecurity talent gap.π Read
via "Dark Reading: ".
Darkreading
Veterans Find New Roles in Enterprise Cybersecurity
Facebook and Synack create programs to educate vets and grow employment opportunities while shrinking the cybersecurity talent gap.
π΄ Paris Agreement on Cybercrime Falls Short of Unanimous Agreement π΄
π Read
via "Dark Reading: ".
More than 50 nations and 150 global companies agree to join effort to fight cybercrime.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Emotet Campaign Ramps Up with Mass Email Harvesting Module β
π Read
via "Threatpost | The first stop for security news".
The new variant can exfiltrate emails for a period going back 180 days, en masse.π Read
via "Threatpost | The first stop for security news".
Threat Post
Emotet Campaign Ramps Up with Mass Email Harvesting Module
The new variant can exfiltrate emails for a period going back 180 days, en masse.
π β4 best practices to combat new IoT security threats at the firmware level π
π Read
via "Security on TechRepublic".
Firmware may be the next frontier for IoT hacks. See below how the healthcare industry addresses these threats.π Read
via "Security on TechRepublic".
TechRepublic
β4 best practices to combat new IoT security threats at the firmware level
Firmware may be the next frontier for IoT hacks. See below how the healthcare industry addresses these threats.
π΄ 2018 On Track to Be One of the Worst Ever for Data Breaches π΄
π Read
via "Dark Reading: ".
A total of 3,676 breaches involving over 3.6 billion records were reported in the first nine months of this year alone.π Read
via "Dark Reading: ".
Darkreading
2018 on Track to Be One of the Worst Ever for Data Breaches
A total of 3,676 breaches involving over 3.6 billion records were reported in the first nine months of this year alone.
β Does wiping your iPhone count as destroying evidence? β
π Read
via "Naked Security".
Police say it's a felony, but a woman arrested in connection with a drive-by shooting says she doesn't even know how to remotely wipe.π Read
via "Naked Security".
Naked Security
Does wiping your iPhone count as destroying evidence?
Police say itβs a felony, but a woman arrested in connection with a drive-by shooting says she doesnβt even know how to remotely wipe.
π Ransomware no. 1 cyberthreat to SMBs, and the average attack costs $47K π
π Read
via "Security on TechRepublic".
More than half of SMBs experienced a ransomware attack in the first half of 2018, according to a Datto report.π Read
via "Security on TechRepublic".
TechRepublic
Ransomware no. 1 cyberthreat to SMBs, and the average attack costs $47K
More than 55% of MSPs said their clients experienced a ransomware attack in the first six months of 2018, according to a Datto report.
β DEA and ICE hiding cameras in streetlights and traffic barrels β
π Read
via "Naked Security".
Drug and immigration cops in the US are buying surveillance cameras to hide in streetlights and traffic barrels.π Read
via "Naked Security".
Naked Security
DEA and ICE hiding cameras in streetlights and traffic barrels
Drug and immigration cops in the US are buying surveillance cameras to hide in streetlights and traffic barrels.
β WordPress GDPR compliance plugin hacked β
π Read
via "Naked Security".
There's no obvious executable payload in the attack but the attackers may be building a collection of websites and biding their time.π Read
via "Naked Security".
Naked Security
WordPress GDPR compliance plugin hacked
Thereβs no obvious executable payload in the attack but the attackers may be building a collection of websites and biding their time.
π΄ Sophisticated Campaign Targets Pakistan's Air Force π΄
π Read
via "Dark Reading: ".
Espionage campaign uses a variety of new evasion techniques.π Read
via "Dark Reading: ".
Darkreading
Sophisticated Campaign Targets Pakistan's Air Force
Espionage campaign uses a variety of new evasion techniques.
β Podcast: IoT Firms Face a βTidal Waveβ of Lawsuits, Attorney Explains β
π Read
via "Threatpost | The first stop for security news".
An attorney in the infamous 2015 Jeep hack predicts that more lawsuits related to IoT security are looming in the future.π Read
via "Threatpost | The first stop for security news".
Threat Post
Podcast: IoT Firms Face a βTidal Waveβ of Lawsuits, Attorney Explains
An attorney in the infamous 2015 Jeep hack predicts that more lawsuits related to IoT security are looming in the future.
β Google and Cloudfare traffic diverted to Chinaβ¦ do we need to panic? β
π Read
via "Naked Security".
A brief outage on Monday diverted traffic to providers such as Google and Cloudflare via China - was it a blunder or a hack?π Read
via "Naked Security".
Naked Security
Google and Cloudfare traffic diverted to China⦠do we need to panic?
A brief outage on Monday diverted traffic to providers such as Google and Cloudflare via China β was it a blunder or a hack?
π Why Gen Z has the most dangerous password practices π
π Read
via "Security on TechRepublic".
Some 87% of Gen Zers reuse old passwords across multiple accounts, compared to 75% of the whole employee population, a SailPoint report found.π Read
via "Security on TechRepublic".
TechRepublic
Why Gen Z has the most dangerous password practices
Some 87% of Gen Zers reuse old passwords across multiple accounts, compared to 75% of the whole employee population, a SailPoint report found.
π΄ RIP, 'IT Security' π΄
π Read
via "Dark Reading: ".
Information security is vital, of course. But the concept of "IT security" has never made sense.π Read
via "Dark Reading: ".
Dark Reading
RIP, 'IT Security'
Information security is vital, of course. But the concept of IT security has never made sense.
π΄ Netskope Announces Series F Funding Round π΄
π Read
via "Dark Reading: ".
The $168.7 million round will go toward R&D and global expansion, says cloud access security broker provider.π Read
via "Dark Reading: ".
Dark Reading
Netskope Announces Series F Funding Round
The $168.7 million round will go toward R&D and global expansion, says cloud access security broker provider.
β Adobe Fixes Acrobat and Reader Flaw With Publicly-Available PoC β
π Read
via "Threatpost | The first stop for security news".
Overall, the company released only three patches as part of its regularly-scheduled November update.π Read
via "Threatpost | The first stop for security news".
Threat Post
Adobe Fixes Acrobat and Reader Flaw With Publicly-Available PoC
Overall, the company released only three patches as part of its regularly-scheduled November update.
β Unpatched Android OS Flaw Allows Adversaries to Track User Location β
π Read
via "Threatpost | The first stop for security news".
The vulnerability is one of many with the same root cause: Cross-process information leakage.π Read
via "Threatpost | The first stop for security news".
Threat Post
Unpatched Android OS Flaw Allows Adversaries to Track User Location
The vulnerability is one of many with the same root cause: Cross-process information leakage.
π΄ Google Traffic Temporarily Rerouted via Russia, China π΄
π Read
via "Dark Reading: ".
The incident, which Google reports is now resolved, could be the result of either technical mistakes or malicious activity.π Read
via "Dark Reading: ".
Darkreading
Google Traffic Temporarily Rerouted via Russia, China
The incident, which Google reports is now resolved, could be the result of either technical mistakes or malicious activity.