π΄ [Sponsored Content] The State of Encryption and How to Improve It π΄
π Read
via "Dark Reading: ".
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.π Read
via "Dark Reading: ".
β Automotive Security: Itβs More Than Just Whatβs Under The Hood β
π Read
via "Threatpost | The first stop for security news".
True auto safety can only be achieved by knowing what every piece of code and hardware is that goes into the car.π Read
via "Threatpost | The first stop for security news".
Threat Post
Automotive Security: Itβs More Than Just Whatβs Under The Hood
True auto safety can only be achieved by knowing what every piece of code and hardware is that goes into the car.
π 5 biggest IoT security failures of 2018 π
π Read
via "Security on TechRepublic".
The ubiquity of internet-connected devices has seen a proportional increase in security failures. Here's the most egregious failures of 2018.π Read
via "Security on TechRepublic".
TechRepublic
5 biggest IoT security failures of 2018
The ubiquity of internet-connected devices has seen a proportional increase in security failures. Here's the most egregious IoT security failures of 2018.
π΄ Chinese Hackers Stole Classified US Navy Info π΄
π Read
via "Dark Reading: ".
Cyberattacks reportedly targeted US Defense contractor.π Read
via "Dark Reading: ".
Dark Reading
Chinese Hackers Stole Classified US Navy Info
Cyberattacks reportedly targeted US Defense contractor.
π Brute force attacks: How to protect your business π
π Read
via "Security on TechRepublic".
Cracking encryption is supposed to take forever, right? Not if an attacker knows what they're doing.π Read
via "Security on TechRepublic".
TechRepublic
Brute force and dictionary attacks: A cheat sheet
Brute force encryption and password cracking are dangerous tools in the wrong hands. Here's what cybersecurity pros need to know to protect enterprises against brute force and dictionary attacks.
π Brute force and dictionary attacks: A cheat sheet π
π Read
via "Security on TechRepublic".
Brute force encryption and password cracking are dangerous tools in the wrong hands. Here's what cybersecurity pros need to know to protect enterprises against brute force and dictionary attacks.π Read
via "Security on TechRepublic".
TechRepublic
Brute force and dictionary attacks: A cheat sheet | TechRepublic
Brute force encryption and password cracking are dangerous tools in the wrong hands. Here's what cybersecurity pros need to know to protect enterprises against brute force and dictionary attacks.
π΄ 53 Bugs in 50 Days: Researchers Fuzz Adobe Reader π΄
π Read
via "Dark Reading: ".
Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.π Read
via "Dark Reading: ".
Dark Reading
53 Bugs in 50 Days: Researchers Fuzz Adobe Reader
Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.
β Twitter Draws Data Privacy Concerns with Two New Bugs β
π Read
via "Threatpost | The first stop for security news".
The two flaws shed light on heightened concern around user data privacy when it comes to data.π Read
via "Threatpost | The first stop for security news".
Threat Post
Twitter Draws Data Privacy Concerns with Two New Bugs
The two flaws shed light on heightened concern around user data privacy when it comes to data.
π΄ Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow π΄
π Read
via "Dark Reading: ".
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.π Read
via "Dark Reading: ".
Darkreading
Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.
π΄ Cyber Readiness Institute Launches New Program for SMBs π΄
π Read
via "Dark Reading: ".
Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.π Read
via "Dark Reading: ".
Dark Reading
Cyber Readiness Institute Launches New Program for SMBs
Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.
β U.S. Ballistic Missile Defense System Rife with Security Holes β
π Read
via "Threatpost | The first stop for security news".
Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.π Read
via "Threatpost | The first stop for security news".
Threat Post
U.S. Ballistic Missile Defense System Rife with Security Holes
Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.
β Sneaky phishing campaign beats two-factor authentication β
π Read
via "Naked Security".
Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesnβt mean every method for doing this is equally secure.π Read
via "Naked Security".
Naked Security
Sneaky phishing campaign beats two-factor authentication
Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesnβt mean every method for doing this is equally secure.
β Twitter fixes bug that lets unauthorized apps get access to DMs β
π Read
via "Naked Security".
"You authorise it - whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!" said the researcher.π Read
via "Naked Security".
Naked Security
Twitter fixes bug that lets unauthorized apps get access to DMs
βYou authorise it β whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!β said the researcher.
β Logitech flaw fixed after Project Zero disclosure β
π Read
via "Naked Security".
The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.π Read
via "Naked Security".
Naked Security
Logitech flaw fixed after Project Zero disclosure
The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.
β Facebook photo API bug exposed usersβ unpublished photos β
π Read
via "Naked Security".
It affected up to 6.8 million users and up to 1,500 apps. βWe're sorry this happened,β said Facebook with what must be acute apology fatigue.π Read
via "Naked Security".
Naked Security
Facebook photo API bug exposed usersβ unpublished photos
It affected up to 6.8 million users and up to 1,500 apps. βWeβre sorry this happened,β said Facebook with what must be acute apology fatigue.
π΄ 8 Security Tips to Gift Your Loved Ones For the Holidays π΄
π Read
via "Dark Reading: ".
Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.π Read
via "Dark Reading: ".
Dark Reading
8 Security Tips to Gift Your Loved Ones For the Holidays
Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.
β Newsmaker Interview: Troy Mursch on Top Botnet Trends β
π Read
via "Threatpost | The first stop for security news".
MikroTik, Hadoop clusters, legislation and more will mark the botnet space in 2019.π Read
via "Threatpost | The first stop for security news".
Threat Post
Newsmaker Interview: Troy Mursch on Top Botnet Trends
MikroTik, Hadoop clusters, legislation and more will mark the botnet space in 2019.
π Why 2019 will introduce stricter privacy regulation π
π Read
via "Security on TechRepublic".
Privacy regulation is a complex topic with ever-changing parameters and requirements. Read some predictions for what's coming in 2019.π Read
via "Security on TechRepublic".
TechRepublic
Why 2019 will introduce stricter privacy regulation
Privacy regulation is a complex topic with ever-changing parameters and requirements. Read some predictions for what's coming in 2019.
β WSJ Webpage Defaced to Support PewDiePie β
π Read
via "Threatpost | The first stop for security news".
The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend.π Read
via "Threatpost | The first stop for security news".
Threat Post
WSJ Webpage Defaced to Support PewDiePie
The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend.
π Why cryptojacking will become an even larger problem in 2019 π
π Read
via "Security on TechRepublic".
Cryptojacking was the runaway security problem in 2018, damaging devices in cybercriminals' pursuit of profits. As cryptocurrency prices fall, 2019 could see more attacks.π Read
via "Security on TechRepublic".
TechRepublic
Why cryptojacking will become an even larger problem in 2019
Cryptojacking was the runaway security problem in 2018, damaging devices in cybercriminals' pursuit of profits. As cryptocurrency prices fall, 2019 could see more attacks.
π΄ How to Engage Your Cyber Enemies π΄
π Read
via "Dark Reading: ".
Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.π Read
via "Dark Reading: ".
Darkreading
How to Engage Your Cyber Enemies
Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.