β Zero-Trust Frameworks: Securing the Digital Transformation β
π Read
via "Threatpost | The first stop for security news".
Zero trust refers to the notion of evaluating the security risk of devices and users within the context of any given moment, without automatically conferring access based on credentials.π Read
via "Threatpost | The first stop for security news".
Threat Post
Zero-Trust Frameworks: Securing the Digital Transformation
Zero trust refers to the notion of evaluating the security risk of devices and users within the context of any given moment, without automatically conferring access based on credentials.
β The passwordless web explained β
π Read
via "Naked Security".
Naked Security attempts to demystify passwordless web authentication.π Read
via "Naked Security".
Naked Security
The passwordless web explained
Naked Security attempts to demystify passwordless web authentication.
π Why military veterans might be key to closing the cybersecurity jobs gap π
π Read
via "Security on TechRepublic".
Discover why it might be prudent to hire veterans who are already trained in cybersecurity and understand the concepts of militarization.π Read
via "Security on TechRepublic".
TechRepublic
Why military veterans might be key to closing the cybersecurity jobs gap
Discover why it might be prudent to hire veterans who are already trained in cybersecurity and understand the concepts of militarization.
β Hacker says USPS ignored serious security flaw for over a year β
π Read
via "Naked Security".
A security researcher claims the US Postal Service ignored a security flaw affecting 60 million users, until it was contacted by a journalist.π Read
via "Naked Security".
Naked Security
Hacker says USPS ignored serious security flaw for over a year
A security researcher claims the US Postal Service ignored a security flaw affecting 60 million users, until it was contacted by a journalist.
β Mobile and IoT attacks β SophosLabs 2019 Threat Report β
π Read
via "Naked Security".
As internet users migrate from desktop and laptop computers to mobile and Internet of Things (IoT) platforms, cybercriminals are too.π Read
via "Naked Security".
Naked Security
Mobile and IoT attacks β SophosLabs 2019 Threat Report
As internet users migrate from desktop and laptop computers to mobile and Internet of Things (IoT) platforms, cybercriminals are too.
β Cryptocurrency βmintingβ flaw could have leached money from exchanges β
π Read
via "Naked Security".
Ethereum's complexity proves to be a rich source of bugs, again.π Read
via "Naked Security".
Naked Security
Cryptocurrency βmintingβ flaw could have leached money from exchanges
Ethereumβs complexity proves to be a rich source of bugs, again.
π Google, Mozilla working on letting web apps edit files despite warning it could be 'abused in terrible ways' π
π Read
via "Security on TechRepublic".
The firms, known for their Chrome and Firefox web browsers, are heading a group that is devising a way for users to save changes they make using web apps.π Read
via "Security on TechRepublic".
TechRepublic
Google, Mozilla working on letting web apps edit files despite warning it could be 'abused in terrible ways'
The firms, known for their Chrome and Firefox web browsers, are heading a group that is devising a way for users to save changes they make using web apps.
β ThreatList: One-Third of Firms Say Their Container Security Lags β
π Read
via "Threatpost | The first stop for security news".
More than one-third of respondents in a new survey havenβt started or are just creating their security strategy plans.π Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: One-Third of Firms Say Their Container Security Lags
More than one-third of respondents in a new survey havenβt started or are just creating their security strategy plans.
β Old Printer Vulnerabilities Die Hard β
π Read
via "Threatpost | The first stop for security news".
New research on an old problem reveals despite efforts, the InfoSec professionals still have a way to go when it comes to securing printers.π Read
via "Threatpost | The first stop for security news".
Threat Post
Old Printer Vulnerabilities Die Hard
New research on an old problem reveals despite efforts, the InfoSec professionals still have a way to go when it comes to securing printers.
π 5 reasons to improve cybersecurity by updating software π
π Read
via "Security on TechRepublic".
Wake up, cybersecurity pros, and don't let your business be an easy target for cybercriminals. Learn why keeping digital infrastructure up-to-date should be an essential part of cybersecurity strategy.π Read
via "Security on TechRepublic".
TechRepublic
5 reasons to improve cybersecurity by updating software
Wake up, cybersecurity pros, and don't let your business be an easy target for cybercriminals. Learn why keeping digital infrastructure up-to-date should be an essential part of your strategy.
β Threatpost News Wrap Podcast for Nov. 23 β
π Read
via "Threatpost | The first stop for security news".
From Ford data security speculation to the VisionDirect data breach, the Threatpost editors talk about this week's biggest stories.π Read
via "Threatpost | The first stop for security news".
Threat Post
Threatpost News Wrap Podcast for Nov. 23
From Ford data security speculation to the VisionDirect data breach, the Threatpost editors talk about this week's biggest stories.
π 8 tips for avoiding phishing, malware, scams, and hacks while holiday shopping online π
π Read
via "Security on TechRepublic".
The holiday season isn't just busy for shoppers--it's busy for cybercriminals, too. Here's a holiday shopping safety guide with advice on how to stay safe online.π Read
via "Security on TechRepublic".
TechRepublic
8 tips for avoiding phishing, malware, scams, and hacks while holiday shopping online
The holiday season isn't just busy for shoppers--it's busy for cybercriminals, too. Here's a holiday shopping safety guide with advice on how to stay safe online.
<b>⌨ How to Shop Online Like a Security Pro ⌨</b>
<code>βTis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. So hereβs a quick refresher course on how to make it through the next few weeks without getting snookered online.</code><code>Media</code><code>Adopting a shopping strategy of simply buying from the online merchant with the lowest advertised prices can be a bit like playing Russian Roulette with your wallet, for the simple reason that there are tons of completely fake e-commerce sites out there looking to separate the unwary from their credit card details.</code><code>Even people who shop mainly at big-name online stores can get scammed if theyβre not wary of too-good-to-be-true offers. For example, KrebsOnSecurity got taken for hundreds of dollars just last year after trying to buy a pricey Sonos speaker from an established Amazon merchant who was selling it new and unboxed at huge discount.</code><code>I later received an email from the seller, who said his Amazon account had been hacked and abused by scammers to create fake sales. Amazon ultimately refunded the money, but if this happens to you around the holidays it could derail plans to get all your shopping done before the expected gift-giving day arrives.</code><code>Here are some other safety and security tips to keep in mind when shopping online:</code><code>-WHEN IN DOUBT, CHECK βEM OUT: If you donβt know much about the online merchant that has the item you wish to buy, take a few minutes to investigate its reputation. After all, itβs not uncommon for bargain basement phantom Web sites to materialize during the holiday season, and then vanish forever not long afterward.</code><code>If youβre buying from an online store that is brand new, the risk that you will get scammed increases significantly. How do you know the lifespan of a site selling that must-have gadget at the lowest price? One easy way to get a quick idea is to run a basic WHOIS search on the siteβs domain name. The more recent the siteβs βcreatedβ date, the more likely it is a phantom store.</code><code>-USE A CREDIT CARD: Itβs nearly impossible for consumers to tell how secure a main street or online merchant is, and safety seals or attestations that something is βhacker safeβ are a guarantee of nothing. In my experience, such sites are just as likely to be compromised as e-commerce sites without these dubious security seals.</code><code>No, itβs best just to shop as if theyβre all compromised. With that in mind, if you have the choice between using a credit or debit card, shop with your credit card.</code><code>Sure, the card associations and your bank are quick to point out that youβre not liable for fraudulent charges that you report in a timely manner, whether itβs debit or a credit card. But this assurance may ring hollow if you wake up one morning to find your checking accounts emptied by card thieves after shopping at a breached merchant with a debit card.</code><code>Who pays for the fees levied against you by different merchants when your checks bounce? You do. Does the bank reimburse you when your credit score takes a ding because your mortgage or car payment was late? Donβt hold your breath.</code><code>-PADLOCK, SCHMADLOCK: For years, consumers have been told to look for the padlock when shopping online. Maybe this was once sound advice. But to my mind, the βlook for the lockβ mantra has created a false sense of security for many Internet users, and has contributed to a dangerous and widespread misunderstanding about what the lock icon is really meant to convey.</code><code>To be clear, you absolutely should run away from any e-commerce site that does not include the padlock (i.e., its Web address does not begin with βhttps://β). But the presence of a padlock icon next to the Web site name in your browserβs address bar does not meanβ¦
<code>βTis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. So hereβs a quick refresher course on how to make it through the next few weeks without getting snookered online.</code><code>Media</code><code>Adopting a shopping strategy of simply buying from the online merchant with the lowest advertised prices can be a bit like playing Russian Roulette with your wallet, for the simple reason that there are tons of completely fake e-commerce sites out there looking to separate the unwary from their credit card details.</code><code>Even people who shop mainly at big-name online stores can get scammed if theyβre not wary of too-good-to-be-true offers. For example, KrebsOnSecurity got taken for hundreds of dollars just last year after trying to buy a pricey Sonos speaker from an established Amazon merchant who was selling it new and unboxed at huge discount.</code><code>I later received an email from the seller, who said his Amazon account had been hacked and abused by scammers to create fake sales. Amazon ultimately refunded the money, but if this happens to you around the holidays it could derail plans to get all your shopping done before the expected gift-giving day arrives.</code><code>Here are some other safety and security tips to keep in mind when shopping online:</code><code>-WHEN IN DOUBT, CHECK βEM OUT: If you donβt know much about the online merchant that has the item you wish to buy, take a few minutes to investigate its reputation. After all, itβs not uncommon for bargain basement phantom Web sites to materialize during the holiday season, and then vanish forever not long afterward.</code><code>If youβre buying from an online store that is brand new, the risk that you will get scammed increases significantly. How do you know the lifespan of a site selling that must-have gadget at the lowest price? One easy way to get a quick idea is to run a basic WHOIS search on the siteβs domain name. The more recent the siteβs βcreatedβ date, the more likely it is a phantom store.</code><code>-USE A CREDIT CARD: Itβs nearly impossible for consumers to tell how secure a main street or online merchant is, and safety seals or attestations that something is βhacker safeβ are a guarantee of nothing. In my experience, such sites are just as likely to be compromised as e-commerce sites without these dubious security seals.</code><code>No, itβs best just to shop as if theyβre all compromised. With that in mind, if you have the choice between using a credit or debit card, shop with your credit card.</code><code>Sure, the card associations and your bank are quick to point out that youβre not liable for fraudulent charges that you report in a timely manner, whether itβs debit or a credit card. But this assurance may ring hollow if you wake up one morning to find your checking accounts emptied by card thieves after shopping at a breached merchant with a debit card.</code><code>Who pays for the fees levied against you by different merchants when your checks bounce? You do. Does the bank reimburse you when your credit score takes a ding because your mortgage or car payment was late? Donβt hold your breath.</code><code>-PADLOCK, SCHMADLOCK: For years, consumers have been told to look for the padlock when shopping online. Maybe this was once sound advice. But to my mind, the βlook for the lockβ mantra has created a false sense of security for many Internet users, and has contributed to a dangerous and widespread misunderstanding about what the lock icon is really meant to convey.</code><code>To be clear, you absolutely should run away from any e-commerce site that does not include the padlock (i.e., its Web address does not begin with βhttps://β). But the presence of a padlock icon next to the Web site name in your browserβs address bar does not meanβ¦
β Spotify Phishers Hijack Music Fansβ Accounts β
π Read
via "Threatpost | The first stop for security news".
The credentials could be used to glean a variety of intel on the victims.π Read
via "Threatpost | The first stop for security news".
Threat Post
Spotify Phishers Hijack Music Fansβ Accounts
The credentials could be used to glean a variety of intel on the victims.
β Monday review β the hot 18 stories of the week β
π Read
via "Naked Security".
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 18 stories of the week
Get yourself up to date with everything we've written in the last seven days β it's weekly roundup time.
β Spectre mitigation guts Linux 4.20 performance β
π Read
via "Naked Security".
One of Intelβs fixes for the Spectre variant 2 chip flaw appears to have taken a big bite out of the performance of the latest Linux kernel.π Read
via "Naked Security".
Naked Security
Spectre mitigation guts Linux 4.20 performance
One of Intelβs fixes for the Spectre variant 2 chip flaw appears to have taken a big bite out of the performance of the latest Linux kernel.
β His phone went dark, then $1m was sucked out in SIM-swap crypto-heist β
π Read
via "Naked Security".
A 21-year-old allegedly SIM-swapped Silicon Valley execsβ phones to steal cryptocurrency, including one man's $1m tuition fund for his kids.π Read
via "Naked Security".
Naked Security
The phone went dark, then $1m was sucked out in SIM-swap crypto-heist
A Silicon Valley exec lost $1m in cryptocoin savings when a 21-year-old allegedly SIM-swapped his phone.
β That Black Mirror episode with the social ratings? Itβs happening IRL β
π Read
via "Naked Security".
Not picking up after your dog will cost you 10 points, for example, in China's Black Mirror-esque plan to socially score citizens.π Read
via "Naked Security".
Naked Security
That Black Mirror episode with the social ratings? Itβs happening IRL
Not picking up after your dog will cost you 10 points, for example, in Chinaβs Black Mirror-esque plan to socially score citizens.
π LinkedIn used 18M non-member emails to target Facebook ads. Were you a victim? π
π Read
via "Security on TechRepublic".
A Data Protection Commissioner investigation found that LinkedIn violated data protection policies shortly before onset of GDPR.π Read
via "Security on TechRepublic".
TechRepublic
LinkedIn used 18M non-member emails to target Facebook ads. Were you a victim?
A Data Protection Commissioner investigation found that LinkedIn violated data protection policies shortly before onset of GDPR.
π΄ Paper Trail Absence May Still Plague 2020 Election π΄
π Read
via "Dark Reading: ".
The recommendation for paper ballots may go unheeded in all or part of at least 6 states in the next national election.π Read
via "Dark Reading: ".
Dark Reading
Paper Trail Absence May Still Plague 2020 Election
The recommendation for paper ballots may go unheeded in all or part of at least 6 states in the next national election.
π΄ 7 Real-Life Dangers That Threaten Cybersecurity π΄
π Read
via "Dark Reading: ".
Cybersecurity means more than bits and bytes; threats are out there IRL, and IT pros need to be prepared.π Read
via "Dark Reading: ".
Dark Reading
7 Real-Life Dangers That Threaten Cybersecurity
Cybersecurity means more than bits and bytes; threats are out there IRL, and IT pros need to be prepared.