π Replace your passwords with passphrases: Here's how to use them to remain secure π
π Read
via "Security on TechRepublic".
Instead of trying to remember a long and complex password, try switching to passphrases. Learn why they're important and how they work.π Read
via "Security on TechRepublic".
TechRepublic
Replace your passwords with passphrases: Hereβs how to use them to remain secure
Instead of trying to remember a long and complex password, try switching to passphrases. Learn why they're important and how they work.
β Joker Spyware Plagues More Google Play Apps β
π Read
via "Threatpost".
The six malicious apps have been removed from Google Play, but could still threaten 200,000 installs.π Read
via "Threatpost".
Threat Post
Joker Spyware Plagues More Google Play Apps
The six malicious apps have been removed from Google Play, but could still threaten 200,000 installs.
π΄ 'KryptoCibule' Uses Several Tricks to Maximize Cryptocurrency Theft π΄
π Read
via "Dark Reading: ".
The malware family uses multiple tactics to steal as much cryptocurrency as possible while flying under the radar.π Read
via "Dark Reading: ".
Dark Reading
'KryptoCibule' Uses Several Tricks to Maximize Cryptocurrency Theft
The malware family uses multiple tactics to steal as much cryptocurrency as possible while flying under the radar.
π΄ Don't Forget Cybersecurity on Your Back-to-School List π΄
π Read
via "Dark Reading: ".
School systems don't seem like attractive targets, but they house lots of sensitive data, such as contact information, grades, health records, and more.π Read
via "Dark Reading: ".
Dark Reading
Don't Forget Cybersecurity on Your Back-to-School List
School systems don't seem like attractive targets, but they house lots of sensitive data, such as contact information, grades, health records, and more.
π Organizations facing nearly 1,200 phishing attacks each month π
π Read
via "Security on TechRepublic".
A new study found that email phishing attacks have become more successful during the COVID-19 pandemic.π Read
via "Security on TechRepublic".
TechRepublic
Organizations facing nearly 1,200 phishing attacks each month
A new study found that email phishing attacks have become more successful during the COVID-19 pandemic.
ATENTIONβΌ New - CVE-2020-12621
π Read
via "National Vulnerability Database".
The Teamwire application 5.3.0 for Android allows physically proximate attackers to exploit a flaw related to the pass-code component.π Read
via "National Vulnerability Database".
π΄ The Hidden Costs of Losing Security Talent π΄
π Read
via "Dark Reading: ".
One person's exit can set off a chain of costly events.π Read
via "Dark Reading: ".
Dark Reading
The Hidden Costs of Losing Security Talent
One person's exit can set off a chain of costly events.
π Data Privacy Legislation in California Keeps Moving Forward π
π Read
via "Subscriber Blog RSS Feed ".
Bills that would regulate the sharing of genetic data and carve out coverage in the CCPA of some HIPAA data are close to being laws in California.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Data Privacy Legislation in California Keeps Moving Forward
Bills that would regulate the sharing of genetic data and carve out coverage in the CCPA of some HIPAA data are close to being laws in California.
β Triple-Threat Cryptocurrency RAT Mines, Steals and Harvests β
π Read
via "Threatpost".
KryptoCibule spreads via pirated software and game torrents.π Read
via "Threatpost".
Threat Post
Triple-Threat Cryptocurrency RAT Mines, Steals and Harvests
KryptoCibule spreads via pirated software and game torrents.
β BEC Wire Transfers Average $80K Per Attack β
π Read
via "Threatpost".
That number represents a big uptick over Q1.π Read
via "Threatpost".
Threat Post
BEC Wire Transfers Average $80K Per Attack
That number represents a big uptick over Q1.
β U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021 β
π Read
via "Threatpost".
U.S. agencies must implement vulnerability-disclosure policies by March 2021, according to a new CISA mandate.π Read
via "Threatpost".
Threat Post
U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021
U.S. agencies must implement vulnerability disclosure policies by March 2021, according to a new CISA mandate.
π΄ New Jersey Man Sentenced to 7+ Years for Cyber Breaking & Entering π΄
π Read
via "Dark Reading: ".
The man installed keyloggers, stealing credentials and information on emerging technology development.π Read
via "Dark Reading: ".
Dark Reading
New Jersey Man Sentenced to 7+ Years for Cyber Breaking & Entering
The man installed keyloggers, stealing credentials and information on emerging technology development.
π΄ Facebook & Twitter Remove Russian Accounts Spreading Disinformation π΄
π Read
via "Dark Reading: ".
The Russia-backed Internet Research Agency has returned with new strategies to sway voters ahead of the 2020 presidential election.π Read
via "Dark Reading: ".
Dark Reading
Facebook & Twitter Remove Russian Accounts Spreading Disinformation
The Russia-backed Internet Research Agency has returned with new strategies to sway voters ahead of the 2020 presidential election.
π΄ 55% of Cybersquatted Domains Are Malicious or Potentially Fraudulent π΄
π Read
via "Dark Reading: ".
The largest online companies, such as Apple and PayPal, and banks are being targeted by cybersquatters, who are also taking advantage of the pandemic, a study finds.π Read
via "Dark Reading: ".
Dark Reading
55% of Cybersquatted Domains Are Malicious or Potentially Fraudulent
The largest online companies, such as Apple and PayPal, and banks are being targeted by cybersquatters, who are also taking advantage of the pandemic, a study finds.
π΄ Most IoT Hardware Dangerously Easy to Crack π΄
π Read
via "Dark Reading: ".
Manufacturers need to invest more effort into protecting root-level access to connected devices, security researcher says.π Read
via "Dark Reading: ".
Dark Reading
Most IoT Hardware Dangerously Easy to Crack
Manufacturers need to invest more effort into protecting root-level access to connected devices, security researcher says.
π MIT scientists unveil cybersecurity aggregation platform to gauge effective measures π
π Read
via "Security on TechRepublic".
The platform allows researchers to analyze cyberattacks without sensitive information being released.π Read
via "Security on TechRepublic".
TechRepublic
MIT scientists unveil cybersecurity aggregation platform to gauge effective measures
The platform allows researchers to analyze cyberattacks without sensitive information being released.
β NSA Mass Surveillance Program Illegal, U.S. Court Rules β
π Read
via "Threatpost".
The NSA argued its mass surveillance program stopped terrorist attacks - but a new U.S. court ruling found that this is not, and may have even been unconstitutional.π Read
via "Threatpost".
Threat Post
NSA Mass Surveillance Program Illegal, U.S. Court Rules
The NSA argued its mass surveillance program stopped terrorist attacks - but a new U.S. court ruling found that this is not legal, and may have even been unconstitutional.
π΄ 5 Ways for Cybersecurity Teams to Work Smarter, Not Harder π΄
π Read
via "Dark Reading: ".
Burnout is real and pervasive, but some common sense tools and techniques can help mitigate all that.π Read
via "Dark Reading: ".
Dark Reading
5 Ways for Cybersecurity Teams to Work Smarter, Not Harder
Burnout is real and pervasive, but some common sense tools and techniques can help mitigate all that.
π Verizon announces 5G network security advances and deploys Quantum Key Distribution network π
π Read
via "Security on TechRepublic".
The carrier conducted trials ahead of 5G launches and says it is one of the first to pilot QKD in the US.π Read
via "Security on TechRepublic".
TechRepublic
Verizon announces 5G network security advances and deploys Quantum Key Distribution network
The carrier conducted trials ahead of 5G launches and says it is one of the first to pilot QKD in the US.
β Python-based Spy RAT Emerges to Target FinTech β
π Read
via "Threatpost".
The Evilnum APT has added the RAT to its arsenal as part of a big change-up in its TTPs.π Read
via "Threatpost".
Threat Post
Python-based Spy RAT Emerges to Target FinTech
The Evilnum APT has added the RAT to its arsenal as part of a big change-up in its TTPs.
ATENTIONβΌ New - CVE-2020-12058
π Read
via "National Vulnerability Database".
Several XSS vulnerabilities in osCommerce CE Phoenix before 1.0.6.0 allow an attacker to inject and execute arbitrary JavaScript code. The malicious code can be injected as follows: the page parameter to catalog/admin/order_status.php, catalog/admin/tax_rates.php, catalog/admin/languages.php, catalog/admin/countries.php, catalog/admin/tax_classes.php, catalog/admin/reviews.php, or catalog/admin/zones.php; or the zpage or spage parameter to catalog/admin/geo_zones.php.π Read
via "National Vulnerability Database".