β Facebook Flaw Exposes Private Photos for 6.8M Users β
π Read
via "Threatpost | The first stop for security news".
The bug allowed 1,500 apps built by 876 developers to view users' unposted "draft" photos.π Read
via "Threatpost | The first stop for security news".
Threat Post
Facebook Flaw Exposes Private Photos for 6.8M Users
The bug allowed 1,500 apps built by 876 developers to view users' unposted "draft" photos.
β WordPress 5.0 Patched to Fix Serious Bugs β
π Read
via "Threatpost | The first stop for security news".
One bug accidentally allowed Google to index user passwords.π Read
via "Threatpost | The first stop for security news".
Threat Post
WordPress 5.0 Patched to Fix Serious Bugs
One bug accidentally allowed Google to index user passwords.
π΄ Who Are You, Really? A Peek at the Future of Identity π΄
π Read
via "Dark Reading: ".
Experts dive into the trends and challenges defining the identity space and predict how online identities will change in years to come.π Read
via "Dark Reading: ".
Dark Reading
Who Are You, Really? A Peek at the Future of Identity
Experts dive into the trends and challenges defining the identity space and predict how online identities will change in years to come.
π΄ Iranian Hackers Target Nuclear Experts, US Officials π΄
π Read
via "Dark Reading: ".
Hackers ramp up efforts to infiltrate email accounts of Americans responsible for enforcing severe economic sanctions on Iran.π Read
via "Dark Reading: ".
Darkreading
Iranian Hackers Target Nuclear Experts, US Officials
Hackers ramp up efforts to infiltrate email accounts of Americans responsible for enforcing severe economic sanctions on Iran.
β Electric Vehicle Charging Stations Open to IoT Attacks β
π Read
via "Threatpost | The first stop for security news".
Flaws could allow an attacker to stop or start a home charging station, or even change the current in order to start a fire.π Read
via "Threatpost | The first stop for security news".
Threat Post
Electric Vehicle Charging Stations Open to IoT Attacks
Flaws could allow an attacker to stop or start a home charging station, or even change the current in order to start a fire.
π΄ Email Bomb Threats Follow Sextortion Playbook π΄
π Read
via "Dark Reading: ".
Yesterday's wave of email bomb threats appear to be an evolution of tactics by the same groups that earlier tried "sextortion" and personal threats, Talos researchers say.π Read
via "Dark Reading: ".
Dark Reading
Email Bomb Threats Follow Sextortion Playbook
Yesterday's wave of email bomb threats appear to be an evolution of tactics by the same groups that earlier tried sextortion and personal threats, Talos researchers say.
β Monday review β the hot 19 stories of the week β
π Read
via "Naked Security".
From a massive WordPress botnot to the Dark Web goldmine busted by Europol, and everything in between. It's time for your weekly roundup.π Read
via "Naked Security".
Naked Security
Monday review β the hot 19 stories of the week
From a massive WordPress botnot to the Dark Web goldmine busted by Europol, and everything in between. Itβs time for your weekly roundup.
β Fake face fools fones β
π Read
via "Naked Security".
Forbes has added to the ever-growing pantheon of ways to trick biometrics by printing a 3D head and using it to break into Android phones.π Read
via "Naked Security".
Naked Security
Fake face fools fones
Forbes has added to the ever-growing pantheon of ways to trick biometrics by printing a 3D head and using it to break into Android phones.
β Former rave kingpin back in jail for bizarre bank heist β
π Read
via "Naked Security".
A former acid house rave kingpin has been sentenced to 20 months for using a bizarre home-built machine to pilfer Β£500,000 from banking customers.π Read
via "Naked Security".
Naked Security
Former rave kingpin back in jail for bizarre bank heist
A former acid house rave kingpin has been sentenced to 20 months for using a bizarre home-built machine to pilfer Β£500,000 from banking customers.
β Worst passwords list is out, but this time weβre not scolding users β
π Read
via "Naked Security".
This is on you, makers of sites and services that allow users to create passwords like "password." You can do better!π Read
via "Naked Security".
Naked Security
Worst passwords list is out, but this time weβre not scolding users
This is on you, makers of sites and services that allow users to create passwords like βpassword.β You can do better!
π Here's how NPM plans to improve security and reliability in 2019 π
π Read
via "Security on TechRepublic".
NPM is working to course-correct after 2018 brought a handful of major incidents that caused usability and security headaches for system administrators.π Read
via "Security on TechRepublic".
TechRepublic
Here's how NPM plans to improve security and reliability in 2019
NPM is working to course-correct after 2018 brought a handful of major incidents that caused usability and security headaches for system administrators.
π Were your private photos exposed due to Facebook's security bug? π
π Read
via "Security on TechRepublic".
Here's how to tell if you were one of the 6.8 million Facebook users whose private photos could have been accessed by third-party apps.π Read
via "Security on TechRepublic".
TechRepublic
Were your private photos exposed due to Facebook's security bug?
Here's how to tell if you were one of the 6.8 million Facebook users whose private photos could have been accessed by third-party apps.
β PewDiePie Hackers Launch Second Printer Siege, According to Reports β
π Read
via "Threatpost | The first stop for security news".
The hackers behind the attack said they have targeted 100,000 more printers in the latest attack dubbed #PrinterHack2.π Read
via "Threatpost | The first stop for security news".
Threat Post
PewDiePie Hackers Say They Launched Second Printer Siege
The hackers behind the attack said they have targeted 100,000 more printers in the latest attack dubbed #PrinterHack2.
π΄ Shhhhh! The Secret to Secrets Management π΄
π Read
via "Dark Reading: ".
Companies need to take a centralized approach to protecting confidential data and assets. Here are 12 ways to get a handle on the problem.π Read
via "Dark Reading: ".
Darkreading
Shhhhh! The Secret to Secrets Management
Companies need to take a centralized approach to protecting confidential data and assets. Here are 12 ways to get a handle on the problem.
π΄ Facebook: Photo API Bug Exposed 6.8M User Photos π΄
π Read
via "Dark Reading: ".
The flaw let developers access images that users may not have shared publicly, including those they started to upload but didn't post.π Read
via "Dark Reading: ".
Dark Reading
Facebook: Photo API Bug Exposed 6.8M User Photos
The flaw let developers access images that users may not have shared publicly, including those they started to upload but didn't post.
π΄ Lax Controls Leave Fortune 500 Overexposed On the Net π΄
π Read
via "Dark Reading: ".
The largest companies in the world have an average of 500 servers and devices accessible from the Internet - and many leave thousands of systems open to attack.π Read
via "Dark Reading: ".
Dark Reading
Lax Controls Leave Fortune 500 Overexposed On the Net
The largest companies in the world have an average of 500 servers and devices accessible from the Internet - and many leave thousands of systems open to attack.
β Charming Kitten Iranian Espionage Campaign Thwarts 2FA β
π Read
via "Threatpost | The first stop for security news".
The campaign targets politicians involved in economic and military sanctions against Iran, along with various journalists and human rights activists.π Read
via "Threatpost | The first stop for security news".
Threat Post
Charming Kitten Iranian Espionage Campaign Thwarts 2FA
The campaign targets politicians involved in economic and military sanctions against Iran, along with various journalists and human rights activists.
π΄ [Sponsored Content] The State of Encryption and How to Improve It π΄
π Read
via "Dark Reading: ".
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.π Read
via "Dark Reading: ".
β Automotive Security: Itβs More Than Just Whatβs Under The Hood β
π Read
via "Threatpost | The first stop for security news".
True auto safety can only be achieved by knowing what every piece of code and hardware is that goes into the car.π Read
via "Threatpost | The first stop for security news".
Threat Post
Automotive Security: Itβs More Than Just Whatβs Under The Hood
True auto safety can only be achieved by knowing what every piece of code and hardware is that goes into the car.
π 5 biggest IoT security failures of 2018 π
π Read
via "Security on TechRepublic".
The ubiquity of internet-connected devices has seen a proportional increase in security failures. Here's the most egregious failures of 2018.π Read
via "Security on TechRepublic".
TechRepublic
5 biggest IoT security failures of 2018
The ubiquity of internet-connected devices has seen a proportional increase in security failures. Here's the most egregious IoT security failures of 2018.
π΄ Chinese Hackers Stole Classified US Navy Info π΄
π Read
via "Dark Reading: ".
Cyberattacks reportedly targeted US Defense contractor.π Read
via "Dark Reading: ".
Dark Reading
Chinese Hackers Stole Classified US Navy Info
Cyberattacks reportedly targeted US Defense contractor.