π΄ New Bluetooth Hack Affects Millions of Vehicles π΄
π Read
via "Dark Reading: ".
Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.π Read
via "Dark Reading: ".
Dark Reading
New Bluetooth Hack Affects Millions of Vehicles
Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.
β Emoji Attack Can Kill Skype for Business Chat β
π Read
via "Threatpost | The first stop for security news".
The "Kitten of Doom" denial-of-service attack is easy to carry out.π Read
via "Threatpost | The first stop for security news".
Threat Post
Emoji Attack Can Kill Skype for Business Chat
The "Kitten of Doom" denial-of-service attack is easy to carry out.
π΄ DHS Task Force Moves Forward on Playbooks for Supply Chain Security π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
DHS Task Force Moves Forward on Playbooks for Supply Chain Security
The public/private task force takes early steps toward securing the end-to-end supply chain.
β Could have sworn I deleted that photo from my phone! [PODCAST] β
π Read
via "Naked Security".
This week: hacking phones at Pwn2Own, the brand new SophosLabs Threat report, and squeezing Shakespeare into one tweet. Enjoy!π Read
via "Naked Security".
Naked Security
Could have sworn I deleted that photo from my phone! [PODCAST]
This week: hacking phones at Pwn2Own, the brand new SophosLabs Threat report, and squeezing Shakespeare into one tweet. Enjoy!
π Is retaining a cybersecurity attorney a good idea for your business? π
π Read
via "Security on TechRepublic".
Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.π Read
via "Security on TechRepublic".
TechRepublic
Is retaining a cybersecurity attorney a good idea for your business?
Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.
ATENTIONβΌ New - CVE-2008-7320
π Read
via "National Vulnerability Database".
** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.π Read
via "National Vulnerability Database".
π How military-style training may enhance your cybersecurity strategy π
π Read
via "Security on TechRepublic".
Find out the benefits of realistic cybersecurity training, such as what is offered by IBM's X-Force Command Center. The facility is modeled on the approach used by the military and first responders.π Read
via "Security on TechRepublic".
TechRepublic
How military-style training may enhance your cybersecurity strategy
Find out the benefits of realistic cybersecurity training, such as what is offered by IBM's X-Force Command Center. The facility is modeled on the approach used by the military and first responders.
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From the Microsoft mistake that left users fuming to the botnet that's pwned 100,000 routers, and everything in between. Catch up with all the stories from the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Did a copy-paste error reveal the USβs secret case against Assange? β
π Read
via "Naked Security".
A court filing in an unrelated case mentioned the need to seal documents to keep secret the fact that "Assange" has been charged.π Read
via "Naked Security".
Naked Security
Did a copy-paste error reveal the USβs secret case against Assange?
A court filing in an unrelated case mentioned the need to seal documents to keep secret the fact that βAssangeβ has been charged.
β Has that website been pwned? Firefox Monitor will tell you β
π Read
via "Naked Security".
Firefox Monitor, a breach notification website launched by Mozilla in September, can now deliver alerts from inside the Firefox browser.π Read
via "Naked Security".
Naked Security
Has that website been pwned? Firefox Monitor will tell you
Firefox Monitor, a breach notification website launched by Mozilla in September, can now deliver alerts from inside the Firefox browser.
β Mozillaβs IoT gift guide ranks gadgets from secure to shoddy β
π Read
via "Naked Security".
Mozilla slapped a βMeets Minimum Security Standards" badge on the IoT gadgets on its list that passed at least some muster.π Read
via "Naked Security".
Naked Security
Mozillaβs IoT gift guide ranks gadgets from secure to shoddy
Mozilla slapped a βMeets Minimum Security Standardsβ badge on the IoT gadgets on its list that passed at least some muster.
π Security warning: UK critical infrastructure still at risk from devastating cyber attack π
π Read
via "Security on TechRepublic".
Not enough is being done to protect against cyber attacks on energy, water and other vital services.π Read
via "Security on TechRepublic".
TechRepublic
Security warning: UK critical infrastructure still at risk from devastating cyber attack
Not enough is being done to protect against cyber attacks on energy, water and other vital services.
π The 4 key points of digital innovation π
π Read
via "Security on TechRepublic".
Experience, ecostructure, efficiency and cybersecurity are the four most crucial aspects of digital innovation for the enterprise.π Read
via "Security on TechRepublic".
TechRepublic
The 4 key points of digital innovation
Experience, ecostructure, efficiency and cybersecurity are the four most crucial aspects of digital innovation for the enterprise.
π How to manage your passwords effectively with KeePass π
π Read
via "Security on TechRepublic".
βKeePass is a popular and free password management tool. Learn about the benefits and techniques to get the most of out of it.π Read
via "Security on TechRepublic".
TechRepublic
How to manage your passwords effectively with KeePass
βKeePass is a popular and free password management tool. Learn about the benefits and techniques to get the most of out of it.
π Top security tips revealed by industry experts π
π Read
via "Security on TechRepublic".
Tech professionals and executives share their top security tips for work--and home.π Read
via "Security on TechRepublic".
TechRepublic
Top security tips revealed by industry experts
Tech professionals and executives share their top security tips for work--and home.
π Excessive API growth puts enterprise security at risk π
π Read
via "Security on TechRepublic".
Offering APIs for external service integrations is important, but poor security practices in API access and design can put your organization in danger.π Read
via "Security on TechRepublic".
TechRepublic
Excessive API growth puts enterprise security at risk
Offering APIs for external service integrations is important, but poor security practices in API access and design can put your organization in danger.
β Cryptojacking Attack Targets Make-A-Wish Foundation Website β
π Read
via "Threatpost | The first stop for security news".
Hackers took advantage of an unpatched Drupal vulnerability in the organization's website to launch a cryptojacking attack.π Read
via "Threatpost | The first stop for security news".
Threat Post
Cryptojacking Attack Targets Make-A-Wish Foundation Website
Hackers took advantage of an unpatched Drupal vulnerability in the organization's website to launch a cryptojacking attack.
π΄ Instagram Privacy Tool Exposed Passwords π΄
π Read
via "Dark Reading: ".
The 'Download Your Data' tool, intended to improve users' privacy, actually became a privacy risk.π Read
via "Dark Reading: ".
Dark Reading
Instagram Privacy Tool Exposed Passwords
The 'Download Your Data' tool, intended to improve users' privacy, actually became a privacy risk.
π΄ 7 Holiday Security Tips for Retailers π΄
π Read
via "Dark Reading: ".
It's the most wonderful of the year - and hackers are ready to pounce. Here's how to prevent them from wreaking holiday havoc.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Stopping the Infiltration of Things β
π Read
via "Threatpost | The first stop for security news".
If a network-connected smoke detector starts communicating with the mail server, you know you have a problem.π Read
via "Threatpost | The first stop for security news".
Threat Post
Stopping the Infiltration of Things
If a network-connected smoke detector starts communicating with the mail server, you know you have a problem.
β Ford Eyes Use of Customersβ Personal Data to Boost Profits β
π Read
via "Threatpost | The first stop for security news".
Ford's CEO sees the tech company model as key to the company's next chapter.π Read
via "Threatpost | The first stop for security news".
Threat Post
Ford Eyes Use of Customersβ Personal Data to Boost Profits
Ford's CEO sees the tech company model as key to the company's next chapter.