β Younger Facebook users 4 times more likely to delete app, study shows β
π Read
via "Naked Security".
They also appear to be more privacy-wary, with 64% changing their settings, comparing to just a third of older users.π Read
via "Naked Security".
Naked Security
Younger Facebook users 4 times more likely to delete app, study shows
They also appear to be more privacy-wary, with 64% changing their settings, comparing to just a third of older users.
β Beware: WhatsApp scammers target children with βOliviaβ porn message β
π Read
via "Naked Security".
"I can send a picture where all of us are together," says "Olivia," before sending a porn URL. Tell kids not to click!π Read
via "Naked Security".
Naked Security
Beware: WhatsApp scammers target children with βOliviaβ porn message
βI can send a picture where all of us are together,β says βOlivia,β before sending a porn URL. Tell kids not to click!
π What to expect from cyber-attacks during an election year π
π Read
via "Security on TechRepublic".
Jake Dilemani, Senior Vice President Mercury Communication, explains how cyber-attacks targeting communication systems and critical infrastructure can alter the course of history.π Read
via "Security on TechRepublic".
TechRepublic
What to expect from cyber-attacks during an election year
Jake Dilemani, Senior Vice President Mercury Communication, explains how cyber-attacks targeting communication systems and critical infrastructure can alter the course of history.
β Microsoft purges 3,000 tech support scams hiding on TechNet β
π Read
via "Naked Security".
Microsoft has taken down thousands of ads for tech support scams that infested the companyβs TechNet support domain.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π‘ After Windows 10 upgrade, do these seven things immediately π‘
π Read
via "Latest topics for ZDNet in Security".
You've just upgraded to the most recent version of Windows 10. Before you get back to work, use this checklist to ensure that your privacy and security settings are correct and that you've cut annoyances to a bare minimum.π Read
via "Latest topics for ZDNet in Security".
ZDNET
After Windows 10 upgrade, do these seven things immediately
You've just upgraded to the most recent version of Windows 10. Before you get back to work, use this checklist to ensure that your privacy and security settings are correct and that you've cut annoyances to a bare minimum.
π‘ BlackBerry's ambitious target: Protecting everything from smartphones to cities π‘
π Read
via "Latest topics for ZDNet in Security".
BlackBerry Security Summit London: CEO John Chen details how the company wants to harness machine learning and AI.π Read
via "Latest topics for ZDNet in Security".
ZDNet
BlackBerry's ambitious target: Protecting everything from smartphones to cities | ZDNet
BlackBerry Security Summit London: CEO John Chen details how the company wants to harness machine learning and AI.
π‘ Phishing warning: One in every one hundred emails is now a hacking attempt π‘
π Read
via "Latest topics for ZDNet in Security".
And just one mistake can compromise an entire organisation.π Read
via "Latest topics for ZDNet in Security".
ZDNET
Phishing warning: One in every one hundred emails is now a hacking attempt
And just one mistake can compromise an entire organisation.
π‘ Okta partners with Yubico to offer free security keys π‘
π Read
via "Latest topics for ZDNet in Security".
Okta will give away two free Okta-branded YubiKey Experience Packs to every Okta customer organization using Okta MFA and Okta Adaptive MFA.π Read
via "Latest topics for ZDNet in Security".
ZDNet
Okta partners with Yubico to offer free security keys
Okta will give away two free Okta-branded YubiKey Starter Packs to every Okta customer organization using Okta MFA and Okta Adaptive MFA.
β CVE-2018-8440 β Task Scheduler ALPC Zero-Day Exploit in the Wild β
π Read
via "Quick Heal Blog | Latest computer security news, tips, and advice".
Estimated reading time: 1 minuteThe recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation of this vulnerability could run arbitrary code in the security context of the local system. About the vulnerability CVE-2018-8440 is a local privilege escalation vulnerability in the Windows Task Schedulerβs Advanced Local Procedure Call (ALPC) interface. The ALPC endpoint in Windows task scheduler exports the SchRpcSetSecurity function, which allows us to set an arbitrary DACL without checking permissions. Exploiting the vulnerability ultimately allows a local unprivileged user to change the permissions of any file on the system. The exploit code release was announced on twitter, on 27th August 2018, by a security researcher who goes with the handle βSandboxEscaperβ. Within days, PowerPool malware was found using the exploit to infect users. Vulnerable versions Windows 7 Windows 8.1 Windows 10 Windows Server 2008, 2012 and 2016 Quick Heal detection Quick Heal has released the following detection for the vulnerability CVE-2018-8440: Trojan.Win64 Trojan.IGeneric Quick Heal Security Labs is actively looking for new in-the-wild exploits for this vulnerability and ensuring coverage for them. References https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8440 Subject Matter Experts Sameer Patil | Quick Heal Security Labs The post CVE-2018-8440 β Task Scheduler ALPC Zero-Day Exploit in the Wild appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.π Read
via "Quick Heal Blog | Latest computer security news, tips, and advice".
Quick Heal Blog
CVE-2018-8440 β Task Scheduler ALPC Zero-Day Exploit in the Wild
The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted...
π Awful military and government LinkedIn passwords highlight need for 2FA, new policies π
π Read
via "Security on TechRepublic".
Password inadequacy remains a top threat in internet security, according to a new report from WatchGuard Technologies.π Read
via "Security on TechRepublic".
TechRepublic
Awful military and government LinkedIn passwords highlight need for 2FA, new policies
Password inadequacy remains a top threat in internet security, according to a new report from WatchGuard Technologies.
π BlackBerry's ambitious target: Protecting everything from smartphones to cities π
π Read
via "Security on TechRepublic".
BlackBerry Security Summit London: CEO John Chen details how the company wants to harness machine learning and AI.π Read
via "Security on TechRepublic".
TechRepublic
BlackBerry's ambitious target: Protecting everything from smartphones to cities
BlackBerry Security Summit London: CEO John Chen details how the company wants to harness machine learning and AI.
π΄ 8 Cryptomining Malware Families to Keep on the Radar π΄
π Read
via "Dark Reading: ".
Cryptojacking attacks at the hands of cryptomining malware is on the rise as these variants of Trojans, worms, and exploit kits make their rounds.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
β Osiris Banking Trojan Displays Modern Malware Innovation β
π Read
via "The first stop for security news | Threatpost ".
Osirisβ fundamental makeup positions it in the fore of malware trends, despite being based on old source code thatβs been knocking around for years.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Osiris Banking Trojan Displays Modern Malware Innovation
Osirisβ fundamental makeup positions it in the fore of malware trends, despite being based on old source code thatβs been knocking around for years.
β Apple Yet to Patch Safari Browser Address Bar Spoofing Flaw β
π Read
via "The first stop for security news | Threatpost ".
A flaw in Safari - that allows an attacker to spoof websites and trick victims into handing over their credentials - has yet to be patched.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Apple Yet to Patch Safari Browser Address Bar Spoofing Flaw
A flaw in Safari - that allows an attacker to spoof websites and trick victims into handing over their credentials - has yet to be patched.
π΄ Mobile Attack Rates Up 24% Globally, 44% in US π΄
π Read
via "Dark Reading: ".
One-third of all fraud targets are mobile, a growing source of all digital transactions.π Read
via "Dark Reading: ".
Dark Reading
Mobile Security recent news | Dark Reading
Explore the latest news and expert commentary on Mobile Security, brought to you by the editors of Dark Reading
π Use Android Pie lockdown mode π
π Read
via "Security on TechRepublic".
Jack Wallen activates and enables Android Pie's new lockdown mode.π Read
via "Security on TechRepublic".
TechRepublic
Use Android Pie lockdown mode
Jack Wallen activates and enables Android Pie's new lockdown mode.
π΄ 4 Trends Giving CISOs Sleepless Nights π΄
π Read
via "Dark Reading: ".
IoT attacks, budget shortfalls, and the skills gap are among the problems keeping security pros up at night.π Read
via "Dark Reading: ".
Darkreading
4 Trends Giving CISOs Sleepless Nights
IoT attacks, budget shortfalls, and the skills gap are among the problems keeping security pros up at night.
π΄ New Study Details Business Benefits of Biometrics π΄
π Read
via "Dark Reading: ".
Biometric authentication can be good for security and for business, according to a new study from Goode Intelligenceπ Read
via "Dark Reading: ".
Dark Reading
New Study Details Business Benefits of Biometrics
Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence
β PowerShell Obfuscation Ups the Ante on Antivirus β
π Read
via "The first stop for security news | Threatpost ".
The development fits a trend that sees threat actors turning to well-known, commodity malware, overcoming its easy detection with ever-better obfuscation methods.π Read
via "The first stop for security news | Threatpost ".
Threat Post
PowerShell Obfuscation Ups the Ante on Antivirus
The development fits a trend that sees threat actors turning to well-known, commodity malware, overcoming its easy detection with ever-better obfuscation methods.
π΄ Creators of Tools for Building Malicious Office Docs Ditch Old Exploits π΄
π Read
via "Dark Reading: ".
In their place is a collection of new exploits for more recently disclosed - and therefore not likely widely patched - vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
Creators of Tools for Building Malicious Office Docs Ditch Old Exploits
In their place is a collection of new exploits for more recently disclosed - and therefore not likely widely patched - vulnerabilities.
π΄ Malware Campaign Targeting Jaxx Wallet Holders Shut Down π΄
π Read
via "Dark Reading: ".
A site spoofing the official Jaxx website was discovered packing several infections for Windows and Mac machines, and has been shut down.π Read
via "Dark Reading: ".
Darkreading
Malware Campaign Targeting Jaxx Wallet Holders Shut Down
A site spoofing the official Jaxx website was discovered packing several infections for Windows and Mac machines, and has been shut down.