ATENTIONβΌ New - CVE-2017-9732
π Read
via "National Vulnerability Database".
The read_packet function in knc (Kerberised NetCat) before 1.11-1 is vulnerable to denial of service (memory exhaustion) that can be exploited remotely without authentication, possibly affecting another services running on the targeted host.π Read
via "National Vulnerability Database".
β Apple spams users with unwanted βCarpool Karaokeβ push notifications β
π Read
via "Naked Security".
It's U2 dΓ©jΓ vu: Apple's yet again shoving stuff at users without their say-so. This time, it's via the TV app, to some iOS users.π Read
via "Naked Security".
Naked Security
Apple spams users with unwanted βCarpool Karaokeβ push notifications
Itβs U2 dΓ©jΓ vu: Appleβs yet again shoving stuff at users without their say-so. This time, itβs via the TV app, to some iOS users.
β Nagging text messages can help you to quit smoking β
π Read
via "Naked Security".
Does nicotine have you in its addictive grip? Chinese researchers have found that you might be helped with an SMS-based intervention.π Read
via "Naked Security".
Naked Security
Nagging text messages can help you to quit smoking
Does nicotine have you in its addictive grip? Chinese researchers have found that you might be helped with an SMS-based intervention.
β Fortnite hackers making a fortune from reselling stolen accounts β
π Read
via "Naked Security".
Teenage hackers have been making thousands of pounds selling stolen accounts for popular online game Fortnite, it emerged this week.π Read
via "Naked Security".
Naked Security
Fortnite hackers making a fortune from reselling stolen accounts
Teenage hackers have been making thousands of pounds selling stolen accounts for popular online game Fortnite, it emerged this week.
π A year after Spectre and Meltdown, how well do patches work? π
π Read
via "Security on TechRepublic".
Attempts to mitigate the landmark vulnerabilities have caused crashes, sudden reboots, and performance degradations. Here's the progress report on the Spectre and Meltdown solution.π Read
via "Security on TechRepublic".
TechRepublic
A year after Spectre and Meltdown, how well do patches work?
Attempts to mitigate the landmark vulnerabilities have caused crashes, sudden reboots, and performance degradations. Here's the progress report on the Spectre and Meltdown solution.
π 12 ways to stay cybersecure over the holidays π
π Read
via "Security on TechRepublic".
Unboxing a new device gift can be exciting, but you need to follow these steps to ensure you don't invite hackers in, according to Palo Alto Networks.π Read
via "Security on TechRepublic".
TechRepublic
12 ways to stay cybersecure over the holidays
Unboxing a new device gift can be exciting, but you need to follow these steps to ensure you don't invite hackers in, according to Palo Alto Networks.
π΄ APT10 Indictments Show Shift to MSP Targets π΄
π Read
via "Dark Reading: ".
US brings more indictments against a cyber espionage group operating in China, but what will they accomplish?π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Microsoft gets users test driving Patch Tuesdayβs non-security updates β
π Read
via "Naked Security".
Are Microsoft's new C and D updates a good idea or a beta by another name?π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Criminals Move Markets to Remain in the Shadows π΄
π Read
via "Dark Reading: ".
While malware families and targets continue to evolve, the most important shift might be happening in the background.π Read
via "Dark Reading: ".
Dark Reading
Criminals Move Markets to Remain in the Shadows
While malware families and targets continue to evolve, the most important shift might be happening in the background.
π΄ US Indicts 2 APT10 Members for Years-Long Hacking Campaign π΄
π Read
via "Dark Reading: ".
In an indictment unsealed this morning, the US ties China's state security agency to a widespread campaign of personal and corporate information theft.π Read
via "Dark Reading: ".
Darkreading
US Indicts 2 APT10 Members for Years-Long Hacking Campaign
In an indictment unsealed this morning, the US ties China's state security agency to a widespread campaign of personal and corporate information theft.
π΄ APT10 Indictments Show Shift to MSP Targets π΄
π Read
via "Dark Reading: ".
US brings more indictments against a cyber espionage group operating in China, but what will they accomplish?π Read
via "Dark Reading: ".
Darkreading
APT10 Indictments Show Expansion of MSP Targeting, Cloud Hopper Campaign
US brings more indictments against the APT10 cyber espionage group operating in China for its Operation Cloud Hopper campaign against managed service providers, but what will those indictments accomplish?
β Caribou Coffee, Brueggerβs Bagels Bitten by Months-Long Breach β
π Read
via "Threatpost | The first stop for security news".
Hackers targeted hundreds of bagel stores across the U.S. to devour customers' credit card info.π Read
via "Threatpost | The first stop for security news".
Threat Post
Caribou Coffee, Brueggerβs Bagels Bitten by Months-Long Breach
Hackers targeted hundreds of bagel stores across the U.S. to scoop customers' credit card info.
π΄ I Spy: Dark Reading Caption Contest Winners π΄
π Read
via "Dark Reading: ".
No shortage of political humor and inside security jokes in this batch of cartoon caption contenders. And the winners are ...π Read
via "Dark Reading: ".
Dark Reading
I Spy: Dark Reading Caption Contest Winners - Dark Reading
No shortage of political humor and inside security jokes in this batch of cartoon caption contenders. And the winners are ...
π΄ Amazon Slip-Up Shows How Much Alexa Really Knows π΄
π Read
via "Dark Reading: ".
Amazon mistakenly sent one user's Alexa recordings to a stranger but neglected to disclose the error.π Read
via "Dark Reading: ".
Dark Reading
Amazon Slip-Up Shows How Much Alexa Really Knows
Amazon mistakenly sent one user's Alexa recordings to a stranger but neglected to disclose the error.
π Why small businesses should check out the PCI SSC's Data Security Essentials π
π Read
via "Security on TechRepublic".
Cash-strapped small businesses get help from the PCI SSC's data security evaluation tool and additional resources to better understand and secure their digital payment systems.π Read
via "Security on TechRepublic".
TechRepublic
Why small businesses should check out the PCI SSC's Data Security Essentials
Cash-strapped small businesses get help from the PCI SSC's data security evaluation tool and additional resources to better understand and secure their digital payment systems.
β More phishing attacks on Yahoo and Gmail SMS 2FA authentication β
π Read
via "Naked Security".
The second report in a week has analysed phishing attacks that are attempting β and probably succeeding β in bypassing older forms of two-factor authentication (2FA).π Read
via "Naked Security".
Naked Security
More phishing attacks on Yahoo and Gmail SMS 2FA
The second report in a week has analysed phishing attacks that are attempting β and probably succeeding β in bypassing older forms of two-factor authentication (2FA).
β FBI Denies Service to 15 DDoS-for-Hire Sites, Charges Operators β
π Read
via "Threatpost | The first stop for security news".
The FBI has taken down several of the largest DDoS-as-a-service sites on the web.π Read
via "Threatpost | The first stop for security news".
Threat Post
FBI Denies Service to 15 DDoS-for-Hire Sites, Charges Operators
The FBI has taken down several of the largest DDoS-as-a-service sites on the web.
β Ep. 013 β Breaches, Facebook and ransomware reinvented [PODCAST] β
π Read
via "Naked Security".
We ring out 2018 with a look at the big issues of the past year. Listen and enjoy!π Read
via "Naked Security".
Naked Security
Ep. 013 β Breaches, Facebook and ransomware reinvented [PODCAST]
We ring out 2018 with a look at the big issues of the past year. Listen and enjoy!
π How to prevent wire-transfer fraud: Tips for SMBs π
π Read
via "Security on TechRepublic".
The information garnered by cybercriminals during a phishing attack is sometimes used to perpetrate costly fraudulent wire transfers. Learn how to prevent the initial phishing scams.π Read
via "Security on TechRepublic".
TechRepublic
How to prevent wire-transfer fraud: Tips for SMBs
The information garnered by cybercriminals during a phishing attack is sometimes used to perpetrate costly fraudulent wire transfers. Learn how to prevent the initial phishing scams.
π΄ Unpatched Kernel-Level Vuln in IBM Security Tool for Apple MacOS Revealed π΄
π Read
via "Dark Reading: ".
Researchers disclose signedness bug in driver used by IBM Trusteer Rapport endpoint security tool after IBM fails to deliver timely patch.π Read
via "Dark Reading: ".
Dark Reading
Unpatched Kernel-Level Vuln in IBM Security Tool for Apple MacOS Revealed
Researchers disclose signedness bug in driver used by IBM Trusteer Rapport endpoint security tool after IBM fails to deliver timely patch.
π΄ 7 Business Metrics Security Pros Need to Know π΄
π Read
via "Dark Reading: ".
These days, security has to speak the language of business. These KPIs will get you started.π Read
via "Dark Reading: ".
Dark Reading
7 Business Metrics Security Pros Need to Know
These days, security has to speak the language of business. These KPIs will get you started.