π΄ Considerations for Seamless CCPA Compliance π΄
π Read
via "Dark Reading: ".
Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.π Read
via "Dark Reading: ".
Dark Reading
Considerations for Seamless CCPA Compliance
Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.
π΄ Anatomy of a Long-Con Phish π΄
π Read
via "Dark Reading: ".
A fraudster on LinkedIn used my online profile in an apparent attempt to pull off a wide-ranging scam business venture.π Read
via "Dark Reading: ".
Dark Reading
Anatomy of a Long-Con Phish
A fraudster on LinkedIn used my online profile in an apparent attempt to pull off a wide-ranging scam business venture.
ATENTIONβΌ New - CVE-2019-20894
π Read
via "National Vulnerability Database".
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.π Read
via "National Vulnerability Database".
π΄ Making Sense of EARN IT & LAED Bills' Implications for Crypto π΄
π Read
via "Dark Reading: ".
After Senate Judiciary Committee pushes EARN IT Act a step closer to ratification, raising further concerns for privacy advocates, here's what to know.π Read
via "Dark Reading: ".
Dark Reading
Making Sense of EARN IT & LAED Bills' Implications for Crypto
After Senate Judiciary Committee pushes EARN IT Act a step closer to ratification, raising further concerns for privacy advocates, here's what to know.
π΄ BG-IP Vulnerabilities Could be Big Trouble for Customers π΄
π Read
via "Dark Reading: ".
Left unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.π Read
via "Dark Reading: ".
Dark Reading
BG-IP Vulnerabilities Could be Big Trouble for Customers
Left unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.
π΄ Building Security Strategies in Sub-Saharan Africa: Trends and Concerns π΄
π Read
via "Dark Reading: ".
Security experts discuss the rise in cybercrime affecting sub-Saharan Africa and the necessary changes to improve security.π Read
via "Dark Reading: ".
Dark Reading
Building Security Strategies in Sub-Saharan Africa: Trends and Concerns
Security experts discuss the rise in cybercrime affecting sub-Saharan Africa and the necessary changes to improve security.
ATENTIONβΌ New - CVE-2019-20419
π Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to execute arbitrary code via a DLL hijacking vulnerability in Tomcat. The affected versions are before version 8.5.5, and from version 8.6.0 before 8.7.2.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-20418
π Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to prevent users from accessing the instance via an Application Denial of Service vulnerability in the /rendering/wiki endpoint. The affected versions are before version 8.8.0.π Read
via "National Vulnerability Database".
β Google buys AR smart-glasses company North β
π Read
via "Naked Security".
They're not surveillance spectacles, says Google, just a piece in the jigsaw of "ambient computing", where helpfulness is all around you.π Read
via "Naked Security".
Naked Security
Google buys AR smart-glasses company North
Theyβre not surveillance spectacles, says Google, just a piece in the jigsaw of βambient computingβ, where helpfulness is all around you.
π΄ Cybersecurity's Lament: There are No Cooks in Space π΄
π Read
via "Dark Reading: ".
Cybersecurity staff are on edge for the same reason that there are no cooks on the ISS: Organizations are carefully watching expenses for jobs that don't require dedicated team members.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity's Lament: There Are No Cooks in Space
Cybersecurity staff are on edge for the same reason that there are no cooks on the ISS: Organizations are carefully watching expenses for jobs that don't require dedicated team members.
β Ring Doorbellβs Police Partnerships Questioned Over Racial Bias β
π Read
via "Threatpost".
Amazon has placed a moratorium on police use of its facial recognition platform - but a congressman asked if that extends to its Ring smart doorbell in a new inquiry.π Read
via "Threatpost".
Threat Post
Ring Doorbellβs Police Partnerships Questioned Over Racial Bias
Amazon has placed a moratorium on police use of its facial recognition platform - but a congressman asked if that extends to its Ring smart doorbell in a new inquiry.
π΄ Introducing 'Secure Access Service Edge' π΄
π Read
via "Dark Reading: ".
The industry's latest buzzword is largely a repackaging exercise that bundles a collection of capabilities together and offers them as a cloud-delivered service.π Read
via "Dark Reading: ".
Dark Reading
Introducing 'Secure Access Service Edge'
The industry's latest buzzword is largely a repackaging exercise that bundles a collection of capabilities together and offers them as a cloud-delivered service.
π Android 11 security features and improvements you need to know π
π Read
via "Security on TechRepublic".
If the Android 11 beta is an indication, Jack Wallen predicts it will be the most secure and best performing release. Developers and pro users, read about security and privacy features in Android 11.π Read
via "Security on TechRepublic".
TechRepublic
Android 11 security features and improvements you need to know
Android 11 is finally released, and there are security and privacy fixes and features you should know about Google's mobile operating system. Jack Wallen provides the details.
β Facebook hoaxes back in the spotlight β what to tell your friends β
π Read
via "Naked Security".
At the risk of giving you a feeling of dΓ©jΓ vu all over again, it's time to talk about Facebook hoaxes once more.π Read
via "Naked Security".
Naked Security
Facebook hoaxes back in the spotlight β what to tell your friends
At the risk of giving you a feeling of dΓ©jΓ vu all over again, itβs time to talk about Facebook hoaxes once more.
β E.U. Authorities Crack Encryption of Massive Criminal and Murder Network β
π Read
via "Threatpost".
Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money.π Read
via "Threatpost".
Threat Post
E.U. Authorities Crack Encryption of Massive Criminal and Murder Network
Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money.
π What are IT pros concerned about in the new normal? Security and flexibility π
π Read
via "Security on TechRepublic".
There are a number of paramount concerns afoot among IT professionals. Learn some of the priorities from industry insiders and experts.π Read
via "Security on TechRepublic".
TechRepublic
What are IT pros concerned about in the new normal? Security and flexibility
There are a number of paramount concerns afoot among IT professionals. Learn some of the priorities from industry insiders and experts.
π How to run an SSH connection through Tor π
π Read
via "Security on TechRepublic".
Looking for a way to gain a bit more security and privacy for your SSH connections? Jack Wallen shows you how with the help of Tor.π Read
via "Security on TechRepublic".
TechRepublic
How to run an SSH connection through Tor | TechRepublic
Looking for a way to gain a bit more security and privacy for your SSH connections? Jack Wallen shows you how with the help of Tor.
β Monday review β the hot 11 stories of the week β
π Read
via "Naked Security".
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 11 stories of the week
Get yourself up to date with everything we've written in the last seven days β it's weekly roundup time.
β Boston bans government use of facial recognition β
π Read
via "Naked Security".
To help end systemic racism, we'll stay away from an error-prone technology that's been shown to have racial bias, the city council said.π Read
via "Naked Security".
Naked Security
Boston bans government use of facial recognition
To help end systemic racism, weβll stay away from an error-prone technology thatβs been shown to have racial bias, the city council said.
β Email Sender Identity is Key to Solving the Phishing Crisis β
π Read
via "Threatpost".
Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.π Read
via "Threatpost".
Threat Post
Email Sender Identity is Key to Solving the Phishing Crisis
Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.
π΄ How to Assess More Sophisticated IoT Threats π΄
π Read
via "Dark Reading: ".
Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis.π Read
via "Dark Reading: ".
Dark Reading
How to Assess More Sophisticated IoT Threats
Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis.