π΄ Mobile Attack Rates Up 24% Globally, 44% in US π΄
π Read
via "Dark Reading: ".
One-third of all fraud targets are mobile, a growing source of all digital transactions.π Read
via "Dark Reading: ".
Dark Reading
Mobile Security recent news | Dark Reading
Explore the latest news and expert commentary on Mobile Security, brought to you by the editors of Dark Reading
π Use Android Pie lockdown mode π
π Read
via "Security on TechRepublic".
Jack Wallen activates and enables Android Pie's new lockdown mode.π Read
via "Security on TechRepublic".
TechRepublic
Use Android Pie lockdown mode
Jack Wallen activates and enables Android Pie's new lockdown mode.
π΄ 4 Trends Giving CISOs Sleepless Nights π΄
π Read
via "Dark Reading: ".
IoT attacks, budget shortfalls, and the skills gap are among the problems keeping security pros up at night.π Read
via "Dark Reading: ".
Darkreading
4 Trends Giving CISOs Sleepless Nights
IoT attacks, budget shortfalls, and the skills gap are among the problems keeping security pros up at night.
π΄ New Study Details Business Benefits of Biometrics π΄
π Read
via "Dark Reading: ".
Biometric authentication can be good for security and for business, according to a new study from Goode Intelligenceπ Read
via "Dark Reading: ".
Dark Reading
New Study Details Business Benefits of Biometrics
Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence
β PowerShell Obfuscation Ups the Ante on Antivirus β
π Read
via "The first stop for security news | Threatpost ".
The development fits a trend that sees threat actors turning to well-known, commodity malware, overcoming its easy detection with ever-better obfuscation methods.π Read
via "The first stop for security news | Threatpost ".
Threat Post
PowerShell Obfuscation Ups the Ante on Antivirus
The development fits a trend that sees threat actors turning to well-known, commodity malware, overcoming its easy detection with ever-better obfuscation methods.
π΄ Creators of Tools for Building Malicious Office Docs Ditch Old Exploits π΄
π Read
via "Dark Reading: ".
In their place is a collection of new exploits for more recently disclosed - and therefore not likely widely patched - vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
Creators of Tools for Building Malicious Office Docs Ditch Old Exploits
In their place is a collection of new exploits for more recently disclosed - and therefore not likely widely patched - vulnerabilities.
π΄ Malware Campaign Targeting Jaxx Wallet Holders Shut Down π΄
π Read
via "Dark Reading: ".
A site spoofing the official Jaxx website was discovered packing several infections for Windows and Mac machines, and has been shut down.π Read
via "Dark Reading: ".
Darkreading
Malware Campaign Targeting Jaxx Wallet Holders Shut Down
A site spoofing the official Jaxx website was discovered packing several infections for Windows and Mac machines, and has been shut down.
π Facebook data privacy scandal: A cheat sheet π
π Read
via "Security on TechRepublic".
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.π Read
via "Security on TechRepublic".
TechRepublic
Facebook data privacy scandal: A cheat sheet
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.
π΄ Modular Malware Brings Stealthy Attacks to Former Soviet States π΄
π Read
via "Dark Reading: ".
A new malware technique is making phishing attacks harder to spot when they succeed.π Read
via "Dark Reading: ".
Darkreading
Modular Malware Brings Stealthy Attacks to Former Soviet States
A new malware technique is making phishing attacks harder to spot when they succeed.
β Update now! Microsoftβs September 2018 Patch Tuesday is here β
π Read
via "Naked Security".
Septemberβs Patch Tuesday is upon Windows users - 61 CVEs, 17 flaws rated as critical, a zero-day and a flaw affecting Adobe Flash Player.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β California bill regulates IoT for first time in US β
π Read
via "Naked Security".
California looks set to regulate IoT devices, becoming the first US state to do so and beating the Federal Government to the post.π Read
via "Naked Security".
Naked Security
California bill regulates IoT for first time in US
California looks set to regulate IoT devices, becoming the first US state to do so and beating the Federal Government to the post.
β Experts Bemoan Shortcomings with IoT Security Bill β
π Read
via "The first stop for security news | Threatpost ".
The infosec community say California's IoT security bill is "nice," but doesn't hit on the important issues.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Experts Bemoan Shortcomings with IoT Security Bill
The infosec community say Californiaβs IoT security bill is βnice,β but doesnβt hit on the important issues.
β Street gang members indicted for stealing POS terminals β
π Read
via "Naked Security".
...and using the credit card terminals to allegedly issue themselves fraudulent returns and to steal taxpayer IDs and bank info.π Read
via "Naked Security".
Naked Security
Street gang members indicted for stealing POS terminals
β¦and using the credit card terminals to allegedly issue themselves fraudulent returns and to steal taxpayer IDs and bank info.
β Veeam leaves MongoDB database wide open, exposes 445m records β
π Read
via "Naked Security".
The data-management firm's customer database held names, email addresses, some IP addresses and more: a wealth of ammo for phishers.π Read
via "Naked Security".
Naked Security
Veeam leaves MongoDB database wide open, exposes 445m records
The data-management firmβs customer database held names, email addresses, some IP addresses and more: a wealth of ammo for phishers.
π΄ The Increasingly Vulnerable Software Supply Chain π΄
π Read
via "Dark Reading: ".
Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.π Read
via "Dark Reading: ".
Darkreading
The Increasingly Vulnerable Software Supply Chain
Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.
π Microsoft Office is more dangerous than you think: Doc deliver 45% of all malware π
π Read
via "Security on TechRepublic".
Malicious Microsoft Office attachments are more common than malicious batch scripts and PowerShell scripts, according to Cofense Intelligence. Here's how to protect your business.π Read
via "Security on TechRepublic".
π΄ Bomgar Buys BeyondTrust π΄
π Read
via "Dark Reading: ".
The companies join forces to broaden their privileged access management portfolio and will take on the BeyondTrust name.π Read
via "Dark Reading: ".
Dark Reading
Bomgar Buys BeyondTrust
The companies join forces to broaden their privileged access management portfolio and will take on the BeyondTrust name.
π΄ Kelihos Botnet Operator Pleads Guilty in Federal Court π΄
π Read
via "Dark Reading: ".
The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.π Read
via "Dark Reading: ".
Darkreading
Kelihos Botnet Operator Pleads Guilty in Federal Court
The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.
π΄ Enterprise Security Needs an Open Data Solution π΄
π Read
via "Dark Reading: ".
What would it look like if more than a tiny fraction of enterprises had access to all the signals hidden in their big data today?π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
β ThreatList: Microsoft Macros Remain Top Vector for Malware Delivery β
π Read
via "The first stop for security news | Threatpost ".
The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Microsoft Macros Remain Top Vector for Malware Delivery
The second-most popular delivery method is CVE-2017-11882, a patched Microsoft vulnerability that allows the attacker to perform arbitrary code-execution.
β You didnβt buy βyourβ iTunes movies; Apple can delete them anytime β
π Read
via "Naked Security".
It's in the terms of service, as one man found out after Apple removed three movies from his iTunes library.π Read
via "Naked Security".
Naked Security
You didnβt buy βyourβ iTunes movies; Apple can delete them anytime
Itβs in the terms of service, as one man found out after Apple removed three movies from his iTunes library.