π What the Google+ security flaw and expedited shutdown means for enterprise users π
π Read
via "Security on TechRepublic".
The consumer version of the social networking service is being shut down faster than originally announced, but the enterprise version will live on.π Read
via "Security on TechRepublic".
TechRepublic
What the Google+ security flaw and expedited shutdown mean for enterprise users
The consumer version of the social networking service is being shut down faster than originally announced, but the enterprise version will live on.
π Facebook data privacy scandal: A cheat sheet π
π Read
via "Security on TechRepublic".
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.π Read
via "Security on TechRepublic".
TechRepublic
Facebook data privacy scandal: A cheat sheet
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.
π 3 ways dark web data trade will change in 2019, and how to protect your business π
π Read
via "Security on TechRepublic".
Sensitive data compromise was a huge problem in 2018 and remains a top concern going into 2019. Here are the three things companies should look out for.π Read
via "Security on TechRepublic".
TechRepublic
3 ways dark web data trade will change in 2019, and how to protect your business
Sensitive data compromise was a huge problem in 2018 and remains a top concern going into 2019. Here are the three things companies should look out for.
π΄ How Well Is Your Organization Investing Its Cybersecurity Dollars? π΄
π Read
via "Dark Reading: ".
The principles, methods, and tools for performing good risk measurement already exist and are being used successfully by organizations today. They take some effort -- and are totally worth it.π Read
via "Dark Reading: ".
Dark Reading
How Well Is Your Organization Investing Its Cybersecurity Dollars?
The principles, methods, and tools for performing good risk measurement already exist and are being used successfully by organizations today. They take some effort -- and are totally worth it.
π΄ Grammarly Takes Bug Bounty Program Public π΄
π Read
via "Dark Reading: ".
The private bug bounty program has nearly 1,500 participants and is ready for a public rollout with HackerOne.π Read
via "Dark Reading: ".
Dark Reading
Grammarly Takes Bug Bounty Program Public
The private bug bounty program has nearly 1,500 participants and is ready for a public rollout with HackerOne.
β Biometrics: Security Solution or Issue? β
π Read
via "Threatpost | The first stop for security news".
Issues still exist when it comes to securing biometrics.π Read
via "Threatpost | The first stop for security news".
Threat Post
Biometrics: Security Solution or Issue?
Issues still exist when it comes to securing biometrics.
π Capitalinstall malware targets healthcare sector, delivers payload via Microsoft Azure π
π Read
via "Security on TechRepublic".
Cloud storage providers offer virus and malware scanning, but the existence of that service is not enough to assume files from the cloud are not malicious.π Read
via "Security on TechRepublic".
π΄ NetSecOPEN Names Founding Members, Board of Directors π΄
π Read
via "Dark Reading: ".
The organization is charged with building open, transparent testing protocols for network security.π Read
via "Dark Reading: ".
Darkreading
NetSecOPEN Names Founding Members, Board of Directors
The organization is charged with building open, transparent testing protocols for network security.
β Adobe December 2018 Security Update Fixes Reader, Acrobat β
π Read
via "Threatpost | The first stop for security news".
The update includes a raft of critical code-execution problems.π Read
via "Threatpost | The first stop for security news".
Threat Post
Adobe December 2018 Security Update Fixes Reader, Acrobat
The update includes a raft of critical code-execution problems.
β Cobalt Group Pushes Revamped ThreadKit Malware β
π Read
via "Threatpost | The first stop for security news".
Threat actors have updated their malware to include a macro-based delivery framework.π Read
via "Threatpost | The first stop for security news".
Threat Post
Cobalt Group Pushes Revamped ThreadKit Malware
Threat actors have updated their malware to include a macro-based delivery framework.
β Data Privacy Issues Trigger Soul Searching in Tech Industry β
π Read
via "Threatpost | The first stop for security news".
Consumers are growing angry when it comes to data misuse - but the real change will need to come from the tech industry's culture when it comes to privacy.π Read
via "Threatpost | The first stop for security news".
Threat Post
Data Privacy Issues Trigger Soul Searching in Tech Industry
Consumers are growing angry when it comes to data misuse - but the real change will need to come from the tech industry's culture when it comes to privacy.
π΄ The Grinch Bot Before Christmas: A Security Story for the Holidays π΄
π Read
via "Dark Reading: ".
Once upon a time, buyers purchased products from certified sellers. Today, hoarders use botnets to amass goods at significant markup for a new gray-market economy.π Read
via "Dark Reading: ".
Darkreading
The Grinch Bot Before Christmas: A Security Story for the Holidays
Once upon a time, buyers purchased products from certified sellers. Today, hoarders use botnets to amass goods at significant markup for a new gray-market economy.
π΄ 49% of Cloud Databases Left Unencrypted π΄
π Read
via "Dark Reading: ".
Businesses also leave information vulnerable in the cloud by failing to implement MFA and configure Kubernetes settings, new research reveals.π Read
via "Dark Reading: ".
Dark Reading
49% of Cloud Databases Left Unencrypted
Businesses also leave information vulnerable in the cloud by failing to implement MFA and configure Kubernetes settings, new research reveals.
β Zero-Day Bug Fixed by Microsoft in December Patch Tuesday β
π Read
via "Threatpost | The first stop for security news".
Microsoft patches nine critical bugs as part of December Patch Tuesday roundup.π Read
via "Threatpost | The first stop for security news".
Threat Post
Zero-Day Bug Fixed by Microsoft in December Patch Tuesday
Microsoft patches nine critical bugs as part of December Patch Tuesday roundup.
β Facebook Fined $11.3M for Privacy Violations β
π Read
via "Threatpost | The first stop for security news".
Italy's regulator found the social giant guilty of misleading consumers as to what it does with their data.π Read
via "Threatpost | The first stop for security news".
Threat Post
Facebook Fined $11.3M for Privacy Violations
Italy's regulator found the social giant guilty of misleading consumers as to what it does with their data.
π΄ Attackers Using New Exploit Kit to Hijack Home & Small Office Routers π΄
π Read
via "Dark Reading: ".
Goal is to steal banking credentials by redirecting users to phishing sites.π Read
via "Dark Reading: ".
Darkreading
Attackers Using New Exploit Kit to Hijack Home & Small Office Routers
Goal is to steal banking credentials by redirecting users to phishing sites.
π΄ Patch Tuesday Arrives with 9 Critical CVEs, 1 Under Attack π΄
π Read
via "Dark Reading: ".
Serious bugs addressed today include a Win32K privilege escalation vulnerability and Windows DNS server heap overflow flaw.π Read
via "Dark Reading: ".
Dark Reading
Patch Tuesday Arrives with 9 Critical CVEs, 1 Under Attack
Serious bugs addressed today include a Win32K privilege escalation vulnerability and Windows DNS server heap overflow flaw.
π΄ Equifax Breach Underscores Need for Accountability, Simpler Architectures π΄
π Read
via "Dark Reading: ".
A new congressional report says the credit reporting firm's September 2017 breach was 'entirely preventable.'π Read
via "Dark Reading: ".
Dark Reading
Equifax Breach Underscores Need for Accountability, Simpler Architectures
A new congressional report says the credit reporting firm's September 2017 breach was 'entirely preventable.'
π΄ Battling Bots Brings Big-Budget Blow to Businesses π΄
π Read
via "Dark Reading: ".
Fighting off bot attacks on Web applications extracts a heavy cost in human resources and technology, according to a just-released report.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Phones are selling location data from βtrustedβ apps β
π Read
via "Naked Security".
Data brokers are tracking 200 million mobile devices in the US, updating locations up to 14,000 times a day, the New York Times has found.π Read
via "Naked Security".
Naked Security
Phones are selling location data from βtrustedβ apps
Data brokers are tracking 200 million mobile devices in the US, updating locations up to 14,000 times a day, the New York Times has found.
β Text CAPTCHAs easily beaten by neural networks β
π Read
via "Naked Security".
As CAPTCHA-haters know to their frequent irritation, the death of the text-based Completely Automated Procedures for Telling Computers and Humans Apart tends to be exaggerated.π Read
via "Naked Security".
Naked Security
Text CAPTCHAs easily beaten by neural networks
As CAPTCHA-haters know to their frequent irritation, the death of the text-based Completely Automated Procedures for Telling Computers and Humans Apart tends to be exaggerated.