π 5 biggest IoT security failures of 2018 π
π Read
via "Security on TechRepublic".
The ubiquity of internet-connected devices has seen a proportional increase in security failures. Here's the most egregious failures of 2018.π Read
via "Security on TechRepublic".
TechRepublic
5 biggest IoT security failures of 2018
The ubiquity of internet-connected devices has seen a proportional increase in security failures. Here's the most egregious IoT security failures of 2018.
π΄ Chinese Hackers Stole Classified US Navy Info π΄
π Read
via "Dark Reading: ".
Cyberattacks reportedly targeted US Defense contractor.π Read
via "Dark Reading: ".
Dark Reading
Chinese Hackers Stole Classified US Navy Info
Cyberattacks reportedly targeted US Defense contractor.
π Brute force attacks: How to protect your business π
π Read
via "Security on TechRepublic".
Cracking encryption is supposed to take forever, right? Not if an attacker knows what they're doing.π Read
via "Security on TechRepublic".
TechRepublic
Brute force and dictionary attacks: A cheat sheet
Brute force encryption and password cracking are dangerous tools in the wrong hands. Here's what cybersecurity pros need to know to protect enterprises against brute force and dictionary attacks.
π Brute force and dictionary attacks: A cheat sheet π
π Read
via "Security on TechRepublic".
Brute force encryption and password cracking are dangerous tools in the wrong hands. Here's what cybersecurity pros need to know to protect enterprises against brute force and dictionary attacks.π Read
via "Security on TechRepublic".
TechRepublic
Brute force and dictionary attacks: A cheat sheet | TechRepublic
Brute force encryption and password cracking are dangerous tools in the wrong hands. Here's what cybersecurity pros need to know to protect enterprises against brute force and dictionary attacks.
π΄ 53 Bugs in 50 Days: Researchers Fuzz Adobe Reader π΄
π Read
via "Dark Reading: ".
Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.π Read
via "Dark Reading: ".
Dark Reading
53 Bugs in 50 Days: Researchers Fuzz Adobe Reader
Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.
β Twitter Draws Data Privacy Concerns with Two New Bugs β
π Read
via "Threatpost | The first stop for security news".
The two flaws shed light on heightened concern around user data privacy when it comes to data.π Read
via "Threatpost | The first stop for security news".
Threat Post
Twitter Draws Data Privacy Concerns with Two New Bugs
The two flaws shed light on heightened concern around user data privacy when it comes to data.
π΄ Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow π΄
π Read
via "Dark Reading: ".
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.π Read
via "Dark Reading: ".
Darkreading
Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.
π΄ Cyber Readiness Institute Launches New Program for SMBs π΄
π Read
via "Dark Reading: ".
Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.π Read
via "Dark Reading: ".
Dark Reading
Cyber Readiness Institute Launches New Program for SMBs
Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.
β U.S. Ballistic Missile Defense System Rife with Security Holes β
π Read
via "Threatpost | The first stop for security news".
Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.π Read
via "Threatpost | The first stop for security news".
Threat Post
U.S. Ballistic Missile Defense System Rife with Security Holes
Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.
β Sneaky phishing campaign beats two-factor authentication β
π Read
via "Naked Security".
Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesnβt mean every method for doing this is equally secure.π Read
via "Naked Security".
Naked Security
Sneaky phishing campaign beats two-factor authentication
Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesnβt mean every method for doing this is equally secure.
β Twitter fixes bug that lets unauthorized apps get access to DMs β
π Read
via "Naked Security".
"You authorise it - whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!" said the researcher.π Read
via "Naked Security".
Naked Security
Twitter fixes bug that lets unauthorized apps get access to DMs
βYou authorise it β whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!β said the researcher.
β Logitech flaw fixed after Project Zero disclosure β
π Read
via "Naked Security".
The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.π Read
via "Naked Security".
Naked Security
Logitech flaw fixed after Project Zero disclosure
The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.
β Facebook photo API bug exposed usersβ unpublished photos β
π Read
via "Naked Security".
It affected up to 6.8 million users and up to 1,500 apps. βWe're sorry this happened,β said Facebook with what must be acute apology fatigue.π Read
via "Naked Security".
Naked Security
Facebook photo API bug exposed usersβ unpublished photos
It affected up to 6.8 million users and up to 1,500 apps. βWeβre sorry this happened,β said Facebook with what must be acute apology fatigue.
π΄ 8 Security Tips to Gift Your Loved Ones For the Holidays π΄
π Read
via "Dark Reading: ".
Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.π Read
via "Dark Reading: ".
Dark Reading
8 Security Tips to Gift Your Loved Ones For the Holidays
Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.
β Newsmaker Interview: Troy Mursch on Top Botnet Trends β
π Read
via "Threatpost | The first stop for security news".
MikroTik, Hadoop clusters, legislation and more will mark the botnet space in 2019.π Read
via "Threatpost | The first stop for security news".
Threat Post
Newsmaker Interview: Troy Mursch on Top Botnet Trends
MikroTik, Hadoop clusters, legislation and more will mark the botnet space in 2019.
π Why 2019 will introduce stricter privacy regulation π
π Read
via "Security on TechRepublic".
Privacy regulation is a complex topic with ever-changing parameters and requirements. Read some predictions for what's coming in 2019.π Read
via "Security on TechRepublic".
TechRepublic
Why 2019 will introduce stricter privacy regulation
Privacy regulation is a complex topic with ever-changing parameters and requirements. Read some predictions for what's coming in 2019.
β WSJ Webpage Defaced to Support PewDiePie β
π Read
via "Threatpost | The first stop for security news".
The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend.π Read
via "Threatpost | The first stop for security news".
Threat Post
WSJ Webpage Defaced to Support PewDiePie
The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend.
π Why cryptojacking will become an even larger problem in 2019 π
π Read
via "Security on TechRepublic".
Cryptojacking was the runaway security problem in 2018, damaging devices in cybercriminals' pursuit of profits. As cryptocurrency prices fall, 2019 could see more attacks.π Read
via "Security on TechRepublic".
TechRepublic
Why cryptojacking will become an even larger problem in 2019
Cryptojacking was the runaway security problem in 2018, damaging devices in cybercriminals' pursuit of profits. As cryptocurrency prices fall, 2019 could see more attacks.
π΄ How to Engage Your Cyber Enemies π΄
π Read
via "Dark Reading: ".
Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.π Read
via "Dark Reading: ".
Darkreading
How to Engage Your Cyber Enemies
Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.
β Hidden Code in Memes Instruct Malware via Twitter β
π Read
via "Threatpost | The first stop for security news".
Analysts discover malicious code embedded in tweeted images.π Read
via "Threatpost | The first stop for security news".
Threat Post
Hidden Code in Memes Instruct Malware via Twitter
Analysts discover malicious code embedded in tweeted images.
β WordPress Targeted with Clever SEO Injection Malware β
π Read
via "Threatpost | The first stop for security news".
The malware does its best to obfuscate SEO injection in WordPress and evade notice from web admins.π Read
via "Threatpost | The first stop for security news".
Threat Post
WordPress Targeted with Clever SEO Injection Malware
The malware does its best to obfuscate SEO injection in WordPress and evade notice from web admins.