β Googleβs βdeceitfulβ location tracking is against the law, say 7 EU groups β
π Read
via "Naked Security".
Seven European consumer organizations are planning to submit a complaint about Google's location tracking activities to their data protection authorities.π Read
via "Naked Security".
Naked Security
Googleβs βdeceitfulβ location tracking is against the law, say 7 EU groups
Seven European consumer organizations are planning to submit a complaint about Googleβs location tracking activities to their data protection authorities.
β Creeps outed as massage app exposes database with workersβ comments β
π Read
via "Naked Security".
Popular massage-booking app Urban lets masseurs/masseuses log comments about creepy customers, and left its database wide open.π Read
via "Naked Security".
Naked Security
Creeps outed as massage app exposes database with workersβ comments
Popular massage-booking app Urban lets masseurs/masseuses log comments about creepy customers, and left its database wide open.
π΄ Black Hat Europe: Get the Nation-State Perspective on Cybersecurity π΄
π Read
via "Dark Reading: ".
Attendees of Black Hat Europe in London next week will hear about worldwide cybersecurity developments and challenges from the Global Commission on the Stability of Cyberspace's Marina Kaljurand.π Read
via "Dark Reading: ".
Dark Reading
Black Hat Europe: Get the Nation-State Perspective on Cybersecurity
Attendees of Black Hat Europe in London next week will hear about worldwide cybersecurity developments and challenges from the Global Commission on the Stability of Cyberspace's Marina Kaljurand.
β Hackers Breach Dunkinβ Donuts Accounts in Credential Stuffing Attack β
π Read
via "Threatpost | The first stop for security news".
The donut giant first noticed the attack Oct. 31.π Read
via "Threatpost | The first stop for security news".
Threat Post
Hackers Breach Dunkinβ Donuts Accounts in Credential Stuffing Attack
The donut giant first noticed the attack Oct. 31.
π Office workers beware: Holiday gift card spear phishing attacks on the rise π
π Read
via "Security on TechRepublic".
Attackers target office managers during the holiday season, tricking them into sending hackers gift cards, according to a Barracuda report.π Read
via "Security on TechRepublic".
TechRepublic
Office workers beware: Holiday gift card spear phishing attacks on the rise
Attackers target office managers during the holiday season, tricking them into sending hackers gift cards, according to a Barracuda report.
π΄ The Return of Email Flooding π΄
π Read
via "Dark Reading: ".
An old attack technique is making its way back into the mainstream with an onslaught of messages that legacy tools and script writing can't easily detect.π Read
via "Dark Reading: ".
Darkreading
The Return of Email Flooding
An old attack technique is making its way back into the mainstream with an onslaught of messages that legacy tools and script writing can't easily detect.
β Cisco Patches Critical Bug in License Management Tool β
π Read
via "Threatpost | The first stop for security news".
The vulnerability could allow attacker to execute arbitrary SQL queries.π Read
via "Threatpost | The first stop for security news".
Threat Post
Cisco Patches Critical Bug in License Management Tool
The vulnerability could allow attacker to execute arbitrary SQL queries.
π΄ Beware the Malware-Laden Brexit News π΄
π Read
via "Dark Reading: ".
New Fancy Bear attack campaign lures victims with phony Brexit-themed document to deliver Zekapab payload.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π How to protect your business from botnets: 6 strategies π
π Read
via "Security on TechRepublic".
Cybercriminals have recently broken records for DDoS strength. Here's how to protect your network from attacks, and prevent devices from being assimilated into botnets.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your business from botnets: 6 strategies
Cybercriminals have recently broken records for DDoS strength. Here's how to protect your network from attacks, and prevent devices from being assimilated into botnets.
π΄ Dunkin' Donuts Serves Up Data Breach Alert π΄
π Read
via "Dark Reading: ".
Forces potentially affected DD Perks customers to reset their passwords after learning of unauthorized access to their personal data.π Read
via "Dark Reading: ".
Darkreading
Dunkin' Donuts Serves Up Data Breach Alert
Forces potentially affected DD Perks customers to reset their passwords after learning of unauthorized access to their personal data.
β Critical Zoom Flaw Lets Hackers Hijack Conference Meetings β
π Read
via "Threatpost | The first stop for security news".
Hackers can spoof messages, hijack screen controls and kick others out of meetings.π Read
via "Threatpost | The first stop for security news".
Threat Post
Critical Zoom Flaw Lets Hackers Hijack Conference Meetings
Hackers can spoof messages, hijack screen controls and kick others out of meetings.
π WannaCry: One year later, is the world ready for another major attack? π
π Read
via "Security on TechRepublic".
ZDNet's Danny Palmer examine's the aftermath of WannaCry, Notpetya, and Bad Rabbit.π Read
via "Security on TechRepublic".
TechRepublic
WannaCry: One year later, is the world ready for another major attack?
ZDNet's Danny Palmer examine's the aftermath of WannaCry, Notpetya, and Bad Rabbit.
π΄ Establishing True Trust in a Zero-Trust World π΄
π Read
via "Dark Reading: ".
Our goal should not be to merely accept zero trust but gain the visibility required to establish real trust.π Read
via "Dark Reading: ".
Darkreading
Establishing True Trust in a Zero-Trust World
Our goal should not be to merely accept zero trust but gain the visibility required to establish true trust.
π A free decryption tool is available for Thanatos ransomware victims π
π Read
via "Security on TechRepublic".
ZDNet's Danny Palmer explains the evolution of the world's weirdest ransomware.π Read
via "Security on TechRepublic".
TechRepublic
A free decryption tool is available for Thanatos ransomware victims
ZDNet's Danny Palmer explains the evolution of the world's weirdest ransomware.
π΄ Dell Forces Password Reset for Online Customers Following Data Breach π΄
π Read
via "Dark Reading: ".
Move prompts questions about scope of intrusion and strength of company's password hashing.π Read
via "Dark Reading: ".
Darkreading
Dell Forces Password Reset for Online Customers Following Data Breach
Move prompts questions about scope of intrusion and strength of company's password hashing.
π΄ Anti-Botnet Guide Aims to Tackle Automated Threats π΄
π Read
via "Dark Reading: ".
The international guide is intended to help organizations defend their networks and systems from automated and distributed attacks.π Read
via "Dark Reading: ".
π΄ MITRE Changes the Game in Security Product Testing π΄
π Read
via "Dark Reading: ".
Nonprofit has published its first-ever evaluation of popular endpoint security tools - measured against its ATT&CK model.π Read
via "Dark Reading: ".
Dark Reading
MITRE Changes the Game in Security Product Testing
Nonprofit has published its first-ever evaluation of popular endpoint security tools - measured against its ATT&CK model.
π΄ Overall Volume of Thanksgiving Weekend Malware Attacks Lower This Year π΄
π Read
via "Dark Reading: ".
But ransomware attacks go through the roof, new threat data from SonicWall shows.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π The top tech news of 2018, ranked π
π Read
via "Security on TechRepublic".
It's been a wild of a year for tech. Here are the biggest tech news stories on our readers' minds.π Read
via "Security on TechRepublic".
TechRepublic
The top tech news of 2018, ranked
It's been a wild of a year for tech. Here are the biggest tech news stories on our readers' minds.
β Driver loses his car to hackers. TWICE. β
π Read
via "Naked Security".
He slapped a tracker on the new one and installed CCTV... which did a fine job of recording the thieves' 90-second-long relay attack.π Read
via "Naked Security".
Naked Security
Driver loses his car to hackers. TWICE.
He slapped a tracker on the new one and installed CCTVβ¦ which did a fine job of recording the thievesβ 90-second-long relay attack.
β 57m Americansβ details leaked online by another misconfigured server β
π Read
via "Naked Security".
Misconfigured Elasticsearch servers spilled personal details on 57 million Americans, said reports this week.π Read
via "Naked Security".
Naked Security
57m Americansβ details leaked online by another misconfigured server
Misconfigured Elasticsearch servers spilled personal details on 57 million Americans, said reports this week.