π΄ Android Malware Hits Victims in 196 Countries π΄
π Read
via "Dark Reading: ".
Malware disguised as games and utilities struck more than 100,000 victims before being taken out of Google Play.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Emotet Malware Gets More Aggressive π΄
π Read
via "Dark Reading: ".
Emotet's operators have been adding new capabilities, making the malware now even more dangerous to its enterprise targets.π Read
via "Dark Reading: ".
Darkreading
Emotet Malware Gets More Aggressive
Emotet's operators have been adding new capabilities, making the malware now even more dangerous to its enterprise targets.
β EU to offer nearly $1m in bug bounties for open-source software β
π Read
via "Naked Security".
Rewards on 15 bug bounty programs start at $28,600 and include open source software such as KeePass, FileZilla, Drupal and VLC media player.π Read
via "Naked Security".
Naked Security
EU to offer nearly $1m in bug bounties for open-source software
Rewards on 15 bug bounty programs start at $28,600 and include open source software such as KeePass, FileZilla, Drupal and VLC media player.
β Adobe Fixes Two Critical Acrobat and Reader Flaws β
π Read
via "Threatpost | The first stop for security news".
An unscheduled patch fixed two critical flaws that could enable arbitrary code execution.π Read
via "Threatpost | The first stop for security news".
Threat Post
Adobe Fixes Two Critical Acrobat and Reader Flaws
An unscheduled patch fixed two critical flaws that could enable arbitrary code execution.
β Vein authentication beaten by wax hand and photograph β
π Read
via "Naked Security".
A new presentation shows how vein authentication systems can be fooled using a fake wax hand model.π Read
via "Naked Security".
Naked Security
Vein authentication beaten by wax hand and photograph
A new presentation shows how vein authentication systems can be fooled using a fake wax hand model.
β Donβt fall victim to the Chromecast hackers β hereβs what to do β
π Read
via "Naked Security".
First they came for your printer... and then they came for your Chromecast - learn how to tighten up your router security.π Read
via "Naked Security".
Naked Security
Donβt fall victim to the Chromecast hackers β hereβs what to do
First they came for your printerβ¦ and then they came for your Chromecast β learn how to tighten up your router security.
π Why Microsoft is leading the march toward a passwordless future π
π Read
via "Security on TechRepublic".
Microsoft rolled out passwordless sign in option for insiders on Windows 10 build 18309. Here's why others will likely follow.π Read
via "Security on TechRepublic".
π How to install the Passbolt Team Password Manager on Ubuntu 18.04 π
π Read
via "Security on TechRepublic".
Passbolt is a powerful, web-based password manager that can be employed by individuals and teams.π Read
via "Security on TechRepublic".
TechRepublic
How to install the Passbolt Team Password Manager on Ubuntu 18.04
Passbolt is a powerful, web-based password manager that can be employed by individuals and teams.
π΄ Microsoft's 'Project Bali' Wants to Let You Control Your Data π΄
π Read
via "Dark Reading: ".
Currently in private beta, Bali is designed to give users control over the data Microsoft collects about them.π Read
via "Dark Reading: ".
Darkreading
Microsoft's 'Project Bali' Wants to Let You Control Your Data
Currently in private beta, Bali is designed to give users control over the data Microsoft collects about them.
π΄ Managing Security in Today's Compliance and Regulatory Environment π΄
π Read
via "Dark Reading: ".
Instead of losing sight of the cybersecurity forest as we navigate the compliance trees, consolidate and simplify regulatory compliance efforts to keep your eyes on the security prize.π Read
via "Dark Reading: ".
Darkreading
Managing Security in Today's Compliance and Regulatory Environment
Instead of losing sight of the cybersecurity forest as we navigate the compliance trees, consolidate and simplify regulatory compliance efforts to keep your eyes on the security prize.
β Wide-Ranging German Doxxing Incident Hits Hundreds of Politicians β
π Read
via "Threatpost | The first stop for security news".
It's not clear why the data release wasn't noticed earlier.π Read
via "Threatpost | The first stop for security news".
Threat Post
Wide-Ranging German Doxxing Incident Hits Hundreds of Politicians
It's not clear why the data release wasn't noticed earlier.
π Phishing toolkit uses custom font and substitution cipher to evade detection π
π Read
via "Security on TechRepublic".
A vintage spycraft tool was updated for the technological age as cybercriminals attempt to evade programmatic detection.π Read
via "Security on TechRepublic".
TechRepublic
Phishing toolkit uses custom font and substitution cipher to evade detection
A vintage spycraft tool was updated for the technological age as cybercriminals attempt to evade programmatic detection.
β Phishing Tactic Hides Tracks with Custom Fonts β
π Read
via "Threatpost | The first stop for security news".
The phishing campaign is using a new technique to hide the source code of its landing page - and stealing credentials from customers of a major U.S.-based bank.π Read
via "Threatpost | The first stop for security news".
Threat Post
Phishing Tactic Hides Tracks with Custom Fonts
The phishing campaign is using a new technique to hide the source code of its landing page - and stealing credentials from customers of a major U.S.-based bank.
β Marriott Revises Breach Scope to 383M Records β
π Read
via "Threatpost | The first stop for security news".
The hotel giant said after de-duping, the breach appears to be smaller than it thought.π Read
via "Threatpost | The first stop for security news".
Threat Post
Marriott Revises Breach Scope to 383M Records
The hotel giant said after de-duping, the breach appears to be smaller than it thought.
β Weather Channel App in a Deluge of Legal Trouble for Data Misuse β
π Read
via "Threatpost | The first stop for security news".
The lawsuit alleges that the Weather Channel app misled users about why it was collecting their (extremely precise) geolocation data.π Read
via "Threatpost | The first stop for security news".
Threat Post
Weather Channel App in a Deluge of Legal Trouble for Data Misuse
The lawsuit alleges that the Weather Channel app misled users about why it was collecting their (extremely precise) geolocation data.
β Facebook hoaxes β harmless fun or security risk? [VIDEO] β
π Read
via "Naked Security".
Here's what you need to know about Facebook hoaxes, all in plain English.π Read
via "Naked Security".
Naked Security
Facebook hoaxes β harmless fun or security risk? [VIDEO]
Hereβs what you need to know about Facebook hoaxes, all in plain English.
π΄ How Intel Has Responded to Spectre and Meltdown π΄
π Read
via "Dark Reading: ".
In a newly published editorial and video, Intel details what specific actions it has taken in the wake of the discovery of the CPU vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
How Intel Has Responded to Spectre and Meltdown
In a newly published editorial and video, Intel details what specific actions it has taken in the wake of the discovery of the CPU vulnerabilities.
π΄ CERT/CC Details Critical Flaws in Microsoft Windows, Server π΄
π Read
via "Dark Reading: ".
The vulnerabilities could be remotely exploited and give attackers control over affected systems.π Read
via "Dark Reading: ".
Darkreading
CERT/CC Details Critical Flaws in Microsoft Windows, Server
The vulnerabilities could be remotely exploited and give attackers control over affected systems.
π CES 2019 Innovation Awards honoree: TrustBox IoT security router π
π Read
via "Security on TechRepublic".
The proliferation of IoT devices has led to a security nightmare that the TrustBox is designed to defeat. Learn more about this CES Innovation Awards honoree.π Read
via "Security on TechRepublic".
TechRepublic
CES 2019 Innovation Awards honoree: TrustBox IoT security router
The proliferation of IoT devices has led to a security nightmare that the TrustBox is designed to defeat. Learn more about this CES Innovation Awards honoree.
π΄ Data on Hundreds of German Politicians Published Online in Massive Compromise π΄
π Read
via "Dark Reading: ".
Authorities are investigating if breach resulted from a leak or a cyberattack.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π The challenges with preventing phishing attacks: An insider's perspective π
π Read
via "Security on TechRepublic".
βPhishing attacks remain rampant and are expected to continue to do so in 2019. Learn an insider's perspective on the difficulties combating them.π Read
via "Security on TechRepublic".
TechRepublic
The challenges with preventing phishing attacks: An insider's perspective
βPhishing attacks remain rampant and are expected to continue to do so in 2019. Learn an insider's perspective on the difficulties combating them.