❌ Top 2018 Security and Privacy Stories ❌
📖 Read
via "Threatpost | The first stop for security news".
The top cybersecurity and privacy trends that biggest impact in 2018.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
Top 2018 Security and Privacy Stories
The top cybersecurity and privacy trends that biggest impact in 2018.
🕴 6 Ways to Anger Attackers on Your Network 🕴
📖 Read
via "Dark Reading: ".
Because you can't hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead.📖 Read
via "Dark Reading: ".
Darkreading
6 Ways to Anger Attackers on Your Network
Because you can't hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead.
❌ 19K Orange Livebox Modems Open to Attack ❌
📖 Read
via "Threatpost | The first stop for security news".
A simple flaw allows attackers to derive WiFi credentials with little effort.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
19K Orange Livebox Modems Open to Attack
A simple flaw allows attackers to derive WiFi credentials with little effort.
🔐 How to secure your Ubuntu 18.04 Desktop installation with Uncomplicated Firewall 🔐
📖 Read
via "Security on TechRepublic".
Looking for more security on your Ubuntu 18.04 desktops? You can't go wrong with enabling the firewall on the Ubuntu Desktop.📖 Read
via "Security on TechRepublic".
TechRepublic
How to secure your Ubuntu 18.04 Desktop installation with Uncomplicated Firewall
Looking for more security on your Ubuntu 18.04 desktops? You can't go wrong with enabling the firewall on the Ubuntu Desktop.
🕴 3 Steps for Cybersecurity Leaders to Bridge the Gender Equality Gap 🕴
📖 Read
via "Dark Reading: ".
By encouraging female participation through education and retaining this interest through an inclusive culture and visible role models, we can begin to close the skill and gender gap in cybersecurity.📖 Read
via "Dark Reading: ".
Darkreading
3 Steps for Cybersecurity Leaders to Bridge the Gender Equality Gap
By encouraging female participation through education and retaining this interest through an inclusive culture and visible role models, we can begin to close the skill and gender gap in cybersecurity.
ATENTION‼ New - CVE-2018-0724
📖 Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in Q'center Virtual Appliance 1.8.1014 and earlier versions could allow remote attackers to inject Javascript code in the compromised application, a different vulnerability than CVE-2018-0723.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2018-0723
📖 Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in Q'center Virtual Appliance 1.8.1014 and earlier versions could allow remote attackers to inject Javascript code in the compromised application, a different vulnerability than CVE-2018-0724.📖 Read
via "National Vulnerability Database".
🕴 Spending Spree: What's on Security Investors' Minds for 2019 🕴
📖 Read
via "Dark Reading: ".
Cybersecurity threats, technology, and investment trends that are poised to dictate venture capital funding in 2019.📖 Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
🕴 Attackers Use Google Cloud to Target US, UK Banks 🕴
📖 Read
via "Dark Reading: ".
Employees at financial services firms hit with an email attack campaign abusing a Google Cloud storage service.📖 Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
ATENTION‼ New - CVE-2018-11742
📖 Read
via "National Vulnerability Database".
NEC Univerge Sv9100 WebPro 6.00.00 devices have Cleartext Password Storage in the Web UI.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2018-11741
📖 Read
via "National Vulnerability Database".
NEC Univerge Sv9100 WebPro 6.00.00 devices have Predictable Session IDs that result in Account Information Disclosure via Home.htm?sessionId=#####&GOTO(8) URIs.📖 Read
via "National Vulnerability Database".
❌ FTC Warns of Netflix Phishing Scam Making Rounds ❌
📖 Read
via "Threatpost | The first stop for security news".
The scam targets Netflix users and asks for payment information.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
FTC Warns of Netflix Phishing Scam Making Rounds
The scam targets Netflix users and asks for payment information.
🕴 Toxic Data: How 'Deepfakes' Threaten Cybersecurity 🕴
📖 Read
via "Dark Reading: ".
The joining of 'deep learning' and 'fake news' makes it possible to create audio and video of real people saying words they never spoke or things they never did.📖 Read
via "Dark Reading: ".
Darkreading
Toxic Data: How 'Deepfakes' Threaten Cybersecurity
The joining of 'deep learning' and 'fake news' makes it possible to create audio and video of real people saying words they never spoke or things they never did.
🕴 2018: The Year Machine Intelligence Arrived in Cybersecurity 🕴
📖 Read
via "Dark Reading: ".
Machine intelligence, in its many forms, began having a significant impact on cybersecurity this year - setting the stage for growing intelligence in security automation for 2019.📖 Read
via "Dark Reading: ".
Dark Reading
2018: The Year Machine Intelligence Arrived in Cybersecurity
Machine intelligence, in its many forms, began having a significant impact on cybersecurity this year - setting the stage for growing intelligence in security automation for 2019.
🕴 IoT Bug Grants Access to Home Video Surveillance 🕴
📖 Read
via "Dark Reading: ".
Due to a shared Amazon S3 credential, all users of the Guardzilla All-In-One Video Security System can view each other's videos.📖 Read
via "Dark Reading: ".
Dark Reading
IoT Bug Grants Access to Home Video Surveillance
Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other's videos.
🕴 The Coolest Hacks of 2018 🕴
📖 Read
via "Dark Reading: ".
In-flight airplanes, social engineers, and robotic vacuums were among the targets of resourceful white-hat hackers this year.📖 Read
via "Dark Reading: ".
Dark Reading
The Coolest Hacks of 2018
In-flight airplanes, social engineers, and robotic vacuums were among the targets of resourceful white-hat hackers this year.
❌ 35C3 Day One: Security, Art and Hacking ❌
📖 Read
via "Threatpost | The first stop for security news".
Conference showcases cutting-edge cybersecurity research, hacking collectives and art.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
35C3 Day One: Security, Art and Hacking
Conference showcases cutting-edge cybersecurity research, hacking collectives and art.
❌ Hijacking Online Accounts Via Hacked Voicemail Systems ❌
📖 Read
via "Threatpost | The first stop for security news".
Proof-of-concept hack of a voicemail systems shows how it can lead to account takeovers multiple online services.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
Hijacking Online Accounts Via Hacked Voicemail Systems
Proof-of-concept hack of a voicemail systems shows how it can lead to account takeovers multiple online services.
🕴 Start Preparing Now for the Post-Quantum Future 🕴
📖 Read
via "Dark Reading: ".
Quantum computing will break most of the encryption schemes on which we rely today. These five tips will help you get ready.📖 Read
via "Dark Reading: ".
Dark Reading
Start Preparing Now for the Post-Quantum Future
Quantum computing will break most of the encryption schemes on which we rely today. These five tips will help you get ready.
⚠ How to protect your Facebook account: a walkthrough ⚠
📖 Read
via "Naked Security".
We walk you through the important settings you can change and behaviors you can implement to lock down your privacy on Facebook. 📖 Read
via "Naked Security".
Naked Security
How to protect your Facebook account: a walkthrough
We walk you through the important settings you can change and behaviors you can implement to lock down your privacy on Facebook.
❌ Guardzilla Home Cameras Open to Anyone Watching Their Footage ❌
📖 Read
via "Threatpost | The first stop for security news".
The home surveillance cams have hard-coded credentials.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
Guardzilla Home Cameras Open to Anyone Wanting to Watch Their Footage
The home surveillance cams have hard-coded credentials.