π΄ 53 Bugs in 50 Days: Researchers Fuzz Adobe Reader π΄
π Read
via "Dark Reading: ".
Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.π Read
via "Dark Reading: ".
Dark Reading
53 Bugs in 50 Days: Researchers Fuzz Adobe Reader
Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.
β Twitter Draws Data Privacy Concerns with Two New Bugs β
π Read
via "Threatpost | The first stop for security news".
The two flaws shed light on heightened concern around user data privacy when it comes to data.π Read
via "Threatpost | The first stop for security news".
Threat Post
Twitter Draws Data Privacy Concerns with Two New Bugs
The two flaws shed light on heightened concern around user data privacy when it comes to data.
π΄ Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow π΄
π Read
via "Dark Reading: ".
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.π Read
via "Dark Reading: ".
Darkreading
Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow
As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.
π΄ Cyber Readiness Institute Launches New Program for SMBs π΄
π Read
via "Dark Reading: ".
Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.π Read
via "Dark Reading: ".
Dark Reading
Cyber Readiness Institute Launches New Program for SMBs
Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.
β U.S. Ballistic Missile Defense System Rife with Security Holes β
π Read
via "Threatpost | The first stop for security news".
Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.π Read
via "Threatpost | The first stop for security news".
Threat Post
U.S. Ballistic Missile Defense System Rife with Security Holes
Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.
β Sneaky phishing campaign beats two-factor authentication β
π Read
via "Naked Security".
Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesnβt mean every method for doing this is equally secure.π Read
via "Naked Security".
Naked Security
Sneaky phishing campaign beats two-factor authentication
Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesnβt mean every method for doing this is equally secure.
β Twitter fixes bug that lets unauthorized apps get access to DMs β
π Read
via "Naked Security".
"You authorise it - whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!" said the researcher.π Read
via "Naked Security".
Naked Security
Twitter fixes bug that lets unauthorized apps get access to DMs
βYou authorise it β whereupon it promptly leaks to the world all your sexts, inappropriate jokes, and dank memes. Tragic!β said the researcher.
β Logitech flaw fixed after Project Zero disclosure β
π Read
via "Naked Security".
The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.π Read
via "Naked Security".
Naked Security
Logitech flaw fixed after Project Zero disclosure
The flaw offered attackers a way of executing keystroke injection to take control of a Windows PC running Logitech Options.
β Facebook photo API bug exposed usersβ unpublished photos β
π Read
via "Naked Security".
It affected up to 6.8 million users and up to 1,500 apps. βWe're sorry this happened,β said Facebook with what must be acute apology fatigue.π Read
via "Naked Security".
Naked Security
Facebook photo API bug exposed usersβ unpublished photos
It affected up to 6.8 million users and up to 1,500 apps. βWeβre sorry this happened,β said Facebook with what must be acute apology fatigue.
π΄ 8 Security Tips to Gift Your Loved Ones For the Holidays π΄
π Read
via "Dark Reading: ".
Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.π Read
via "Dark Reading: ".
Dark Reading
8 Security Tips to Gift Your Loved Ones For the Holidays
Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.
β Newsmaker Interview: Troy Mursch on Top Botnet Trends β
π Read
via "Threatpost | The first stop for security news".
MikroTik, Hadoop clusters, legislation and more will mark the botnet space in 2019.π Read
via "Threatpost | The first stop for security news".
Threat Post
Newsmaker Interview: Troy Mursch on Top Botnet Trends
MikroTik, Hadoop clusters, legislation and more will mark the botnet space in 2019.
π Why 2019 will introduce stricter privacy regulation π
π Read
via "Security on TechRepublic".
Privacy regulation is a complex topic with ever-changing parameters and requirements. Read some predictions for what's coming in 2019.π Read
via "Security on TechRepublic".
TechRepublic
Why 2019 will introduce stricter privacy regulation
Privacy regulation is a complex topic with ever-changing parameters and requirements. Read some predictions for what's coming in 2019.
β WSJ Webpage Defaced to Support PewDiePie β
π Read
via "Threatpost | The first stop for security news".
The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend.π Read
via "Threatpost | The first stop for security news".
Threat Post
WSJ Webpage Defaced to Support PewDiePie
The hack comes on the heels of the PewDiePie-supporting printer attacks over the weekend.
π Why cryptojacking will become an even larger problem in 2019 π
π Read
via "Security on TechRepublic".
Cryptojacking was the runaway security problem in 2018, damaging devices in cybercriminals' pursuit of profits. As cryptocurrency prices fall, 2019 could see more attacks.π Read
via "Security on TechRepublic".
TechRepublic
Why cryptojacking will become an even larger problem in 2019
Cryptojacking was the runaway security problem in 2018, damaging devices in cybercriminals' pursuit of profits. As cryptocurrency prices fall, 2019 could see more attacks.
π΄ How to Engage Your Cyber Enemies π΄
π Read
via "Dark Reading: ".
Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.π Read
via "Dark Reading: ".
Darkreading
How to Engage Your Cyber Enemies
Having the right mix of tools, automation, and intelligence is key to staying ahead of new threats and protecting your organization.
β Hidden Code in Memes Instruct Malware via Twitter β
π Read
via "Threatpost | The first stop for security news".
Analysts discover malicious code embedded in tweeted images.π Read
via "Threatpost | The first stop for security news".
Threat Post
Hidden Code in Memes Instruct Malware via Twitter
Analysts discover malicious code embedded in tweeted images.
β WordPress Targeted with Clever SEO Injection Malware β
π Read
via "Threatpost | The first stop for security news".
The malware does its best to obfuscate SEO injection in WordPress and evade notice from web admins.π Read
via "Threatpost | The first stop for security news".
Threat Post
WordPress Targeted with Clever SEO Injection Malware
The malware does its best to obfuscate SEO injection in WordPress and evade notice from web admins.
π΄ Cryptographic Erasure: Moving Beyond Hard Drive Destruction π΄
π Read
via "Dark Reading: ".
In the good old days, incinerating backup tapes or shredding a few hard drives would have solved the problem. Today, we have a bigger challenge.π Read
via "Dark Reading: ".
Darkreading
Cryptographic Erasure: Moving Beyond Hard Drive Destruction
In the good old days, incinerating backup tapes or shredding a few hard drives would have solved the problem. Today, we have a bigger challenge.
β After SamSam, Ryuk shows targeted ransomware is still evolving β
π Read
via "Naked Security".
Devastating, targeted ransomware attacks didn't start with SamSam and they didn't end with it either.π Read
via "Naked Security".
Naked Security
After SamSam, Ryuk shows targeted ransomware is still evolving
Devastating, targeted ransomware attacks didnβt start with SamSam and they didnβt end with it either.
π΄ Trend Micro Finds Major Flaws in HolaVPN π΄
π Read
via "Dark Reading: ".
A popular free VPN is found to have a very high cost for users.π Read
via "Dark Reading: ".
Dark Reading
Trend Micro Finds Major Flaws in HolaVPN
A popular free VPN is found to have a very high cost for users.
π΄ Twitter Hack May Have State-Sponsored Ties π΄
π Read
via "Dark Reading: ".
A data leak was disclosed after attackers targeted a support form, which had "unusual activity."π Read
via "Dark Reading: ".
Dark Reading
Twitter Hack May Have State-Sponsored Ties
A data leak was disclosed after attackers targeted a support form, which had unusual activity.