β Flash zero-day exploit spotted β patch now! β
π Read
via "Naked Security".
If youβre among the holdouts still running Flash, you have some more updating homework to do.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π 10 tips to combat phishing via social media platforms π
π Read
via "Security on TechRepublic".
Social media platforms are just as susceptible to phishing attempts as email. Learn some strategies to protect yourself and your users from such attacks.π Read
via "Security on TechRepublic".
TechRepublic
10 tips to combat phishing via social media platforms
Social media platforms are just as susceptible to phishing attempts as email. Learn some strategies to protect yourself and your users from such attacks.
π 22 Android click fraud apps with 2M+ downloads removed from Google Play Store π
π Read
via "Security on TechRepublic".
Fraudulent apps rely on a backdoor opened to receive instructions from a command and control server, opening users to greater potential harm.π Read
via "Security on TechRepublic".
TechRepublic
22 Android click fraud apps with 2M+ downloads removed from Google Play Store
Fraudulent apps rely on a backdoor opened to receive instructions from a command and control server, opening users to greater potential harm.
β Microsoft Calls For Facial Recognition Tech Regulation β
π Read
via "Threatpost | The first stop for security news".
Microsoft and the AI Now Institute are both calling for regulation as facial recognition software picks up popularity.π Read
via "Threatpost | The first stop for security news".
Threat Post
Microsoft Calls For Facial Recognition Tech Regulation
Microsoft and the AI Now Institute are both calling for regulation as facial recognition software picks up popularity.
π 7 tips for CXOs to combat cybersecurity risks in 2019 and beyond π
π Read
via "Security on TechRepublic".
This year alone saw more than 600 data breaches, yet only 25% of organizations are planning to defend against attacks, according to Deloitte.π Read
via "Security on TechRepublic".
TechRepublic
7 tips for CXOs to combat cybersecurity risks in 2019 and beyond
This year alone saw more than 600 data breaches, yet only 25% of organizations are planning to defend against attacks, according to Deloitte.
β Using Fuzzing to Mine for Zero-Days β
π Read
via "Threatpost | The first stop for security news".
Infosec Insider Derek Manky discusses how new technologies and economic models are facilitating fuzzing in today's security landscape.π Read
via "Threatpost | The first stop for security news".
Threat Post
Using Fuzzing to Mine for Zero-Days
Infosec Insider Derek Manky discusses how new technologies and economic models are facilitating fuzzing in today's security landscape.
π΄ Insider Threats & Insider Objections π΄
π Read
via "Dark Reading: ".
The 'tyranny of the urgent' and three other reasons why it's hard for CISOs to establish a robust insider threat prevention program.π Read
via "Dark Reading: ".
Darkreading
Insider Threats & Insider Objections
The βtyranny of the urgentβ and three other reasons why itβs hard for CISOs to establish a robust insider threat prevention program.
π΄ Kubernetes Deployments Around the World Show Vulnerabilities π΄
π Read
via "Dark Reading: ".
Kubernetes owners who expose APIs to the Internet are leaving their systems open to hackers.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β TA505 Crooks are Now Targeting US Retailers with Personalized Campaigns β
π Read
via "Threatpost | The first stop for security news".
Threat group moves away from βsmash-and-grabβ attacks and adopts a boutique approach to targeting victims.π Read
via "Threatpost | The first stop for security news".
Threat Post
TA505 Crooks are Now Targeting US Retailers with Personalized Campaigns
Threat group moves away from βsmash-and-grabβ attacks and adopts a boutique approach to targeting victims.
π Top 5 features smart homes still need π
π Read
via "Security on TechRepublic".
Tom Merritt explains five ways smart home technology is evolving.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 ways smart homes are getting smarter
Tom Merritt explains five ways smart home technology is evolving.
π Top 5 ways smart homes are getting smarter π
π Read
via "Security on TechRepublic".
Tom Merritt explains five ways smart home technology is evolving.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 ways smart homes are getting smarter
Tom Merritt explains five ways smart home technology is evolving.
β Australia Anti-Encryption Law Triggers Sweeping Backlash β
π Read
via "Threatpost | The first stop for security news".
A newly-passed Australian law could allow the government to force tech companies to create backdoors in their products.π Read
via "Threatpost | The first stop for security news".
Threat Post
Australia Anti-Encryption Law Triggers Sweeping Backlash
A newly-passed Australian law could allow the government to force tech companies to create backdoors in their products.
π΄ Iranian Nationals Charged for Atlanta Ransomware Attack π΄
π Read
via "Dark Reading: ".
The March attack used SamSam ransomware to infect 3,789 computers.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π΄ 'Simplify Everything': Google Talks Container Security in 2019 π΄
π Read
via "Dark Reading: ".
Google Cloud's container security lead shares predictions, best practices, and what's top of mind for customers.π Read
via "Dark Reading: ".
Dark Reading
'Simplify Everything': Google Talks Container Security in 2019
Google Cloud's container security lead shares predictions, best practices, and what's top of mind for customers.
π΄ Criminals Use Locally Connected Devices to Attack, Loot Banks π΄
π Read
via "Dark Reading: ".
Tens of millions of dollars stolen from at least eight banks in East Europe, Kasperksy Lab says.π Read
via "Dark Reading: ".
Darkreading
Criminals Use Locally Connected Devices to Attack, Loot Banks
Tens of millions of dollars stolen from at least eight banks in East Europe, Kasperksy Lab says.
β ThreatList: Gift Card-Themed BEC Holiday Scams Spike β
π Read
via "Threatpost | The first stop for security news".
Watch out for emails about gift cards and corporate donations, researcher warn.π Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: Gift Card-Themed BEC Holiday Scams Spike
Watch out for emails about gift cards and corporate donations, researcher warn.
π΄ 'PowerSnitch' Hacks Androids via Power Banks π΄
π Read
via "Dark Reading: ".
Researcher demonstrates how attackers could steal data from smartphones while they charge up.π Read
via "Dark Reading: ".
Dark Reading
'PowerSnitch' Hacks Androids via Power Banks
Researcher demonstrates how attackers could steal data from smartphones while they're charging.
π Networking trends and news: 2018 year in review π
π Read
via "Security on TechRepublic".
Networking is a fairly old subject, but there are still plenty of interesting things happening. Highlights from 2018 include stories about security, 5G, net neutrality, the Linux Foundation, and more.π Read
via "Security on TechRepublic".
TechRepublic
Networking trends and news: 2018 year in review
Networking is a fairly old subject, but there are still plenty of interesting things happening. Highlights from 2018 include stories about security, 5G, net neutrality, the Linux Foundation, and more.
β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From UPnP router attacks to the Kubernetes cloud computing bug, and everything in between. It's time for your weekly roundup.π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
From UPnP router attacks to the Kubernetes cloud computing bug, and everything in between. Itβs time for your weekly roundup.
β Microsoft calls for laws on facial recognition, issues principles β
π Read
via "Naked Security".
Profits are nice, but "We donβt believe that the world will be best served by a commercial race to the bottom," says President Brad Smith.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Microsoftβs gutting Edge and stuffing it with Chromium β
π Read
via "Naked Security".
Edge joins Chrome, Opera, Vivaldi, Yandex, and Brave. Better for web compatibility, but if one thing breaks, they all break.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News