β You canβt delete Facebook from some Androids and people arenβt happy β
π Read
via "Naked Security".
The #DeleteFacebook movement may be growing, but many Samsung users are having a tough time scraping the social networkβs preinstalled software from their phones.π Read
via "Naked Security".
Naked Security
You canβt delete Facebook from some Androids and people arenβt happy
The #DeleteFacebook movement may be growing, but many Samsung users are having a tough time scraping the social networkβs preinstalled software from their phones.
π΄ Reddit Alerts Users to Possible Account Breaches π΄
π Read
via "Dark Reading: ".
User lockouts, combined with requirements for new passwords, indicate an attack on accounts at the popular social media platform.π Read
via "Dark Reading: ".
Darkreading
Reddit Alerts Users to Possible Account Breaches
User lockouts, combined with requirements for new passwords, indicate an attack on accounts at the popular social media platform.
β At CES, Focus is On βCool Factorβ Not IoT Security β
π Read
via "Threatpost | The first stop for security news".
When it comes to IoT, the priority at CES is the "wow factor" - but not so much a focus on security.π Read
via "Threatpost | The first stop for security news".
Threat Post
At CES, Focus is On βCool Factorβ Not IoT Security
When it comes to IoT, the priority at CES is the "wow factor" - but not so much a focus on security.
π΄ DNS Hijacking Campaign Targets Organizations Globally π΄
π Read
via "Dark Reading: ".
A group believed to be operating out of Iran has manipulated DNS records belonging to dozens of firms in an apparent cyber espionage campaign, FireEye says.π Read
via "Dark Reading: ".
Darkreading
DNS Hijacking Campaign Targets Organizations Globally
A group believed to be operating out of Iran has manipulated DNS records belonging to dozens of firms in an apparent cyber espionage campaign, FireEye says.
π΄ New Software Side-Channel Attack Raises Risk for Captured Crypto π΄
π Read
via "Dark Reading: ".
The new attack hits operating systems, not chips, and may give criminals the keys to a company's cryptography.π Read
via "Dark Reading: ".
Dark Reading
New Software Side-Channel Attack Raises Risk for Captured Crypto
The new attack hits operating systems, not chips, and may give criminals the keys to a company's cryptography.
ATENTIONβΌ New - CVE-2017-1002157
π Read
via "National Vulnerability Database".
modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-1002152
π Read
via "National Vulnerability Database".
Bodhi 2.9.0 and lower is vulnerable to cross-site scripting resulting in code injection caused by incorrect validation of bug titles.π Read
via "National Vulnerability Database".
β El Chapo was brought down by a sysadmin β
π Read
via "Naked Security".
Christian Rodriguez says he set up secure VoIP communications for the cartel: a system whose encryption keys he wound up giving to the FBI.π Read
via "Naked Security".
Naked Security
El Chapo was brought down by a sysadmin
Christian Rodriguez says he set up secure VoIP communications for the cartel: a system whose encryption keys he wound up giving to the FBI.
β Trading site DX.Exchange spills gobs of user data β
π Read
via "Naked Security".
A trader believes he could easily have obtained admin access to the site and potentially have stolen the funds of its 600,000 users.π Read
via "Naked Security".
Naked Security
Trading site DX.Exchange spills gobs of user data
A trader believes he could easily have obtained admin access to the site and potentially have stolen the funds of its 600,000 users.
β 2FA codes can be phished by new pentest tool β
π Read
via "Naked Security".
A researcher has published a tool called Modlishka, capable of phishing 2FA codes sent by SMS or authentication apps.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π 3 basic things to know about your data, according to Xerox's CISO π
π Read
via "Security on TechRepublic".
Dan Patterson interviews Xerox CISO Alissa Abdullah about protecting sensitive data from adversaries. They also discuss the recent Marriott hack, privacy, ransomware, machine learning, and IoT.π Read
via "Security on TechRepublic".
TechRepublic
3 basic things to know about your data, according to Xerox's CISO
Dan Patterson interviews Xerox CISO Alissa Abdullah about protecting sensitive data from adversaries. They also discuss the recent Marriott hack, privacy, ransomware, machine learning, and IoT.
β Old tweets reveal hidden secrets β
π Read
via "Naked Security".
Old Twitter posts could reveal more about you than you think, according to researchers, even if you didnβt explicitly mention it.π Read
via "Naked Security".
Naked Security
Old tweets reveal hidden secrets
Old Twitter posts could reveal more about you than you think, according to researchers, even if you didnβt explicitly mention it.
π 69% of enterprises moving business-critical applications to the cloud π
π Read
via "Security on TechRepublic".
Security concerns top the list of challenges to cloud migration, according to a Cloud Security Alliance report.π Read
via "Security on TechRepublic".
TechRepublic
69% of enterprises moving business-critical applications to the cloud
Security concerns top the list of challenges to cloud migration, according to a Cloud Security Alliance report.
π΄ Kudos to the Unsung Rock Stars of Security π΄
π Read
via "Dark Reading: ".
It is great to have heroes, but the real security heroes are the men and women who keep the bad guys out while fighting their own organizations at the same time.π Read
via "Dark Reading: ".
Darkreading
Kudos to the Unsung Rock Stars of Security
It is great to have heroes, but the real security heroes are the men and women who keep the bad guys out while fighting their own organizations at the same time.
β Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In β
π Read
via "Threatpost | The first stop for security news".
A penetration testing tool called Modlishka can defeat two-factor authentication in the latest 2FA security issue. We asked a roundtable of experts what it all means.π Read
via "Threatpost | The first stop for security news".
Threat Post
Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In
A penetration testing tool called Modlishka can defeat two-factor authentication in the latest 2FA security issue. We asked a roundtable of experts what it all means.
β U.S. Government Shutdown Leaves Dozens of .Gov Websites Vulnerable β
π Read
via "Threatpost | The first stop for security news".
As the shutdown continues into its 21st day, dozens of .gov websites haven't renewed their TLS certificates.π Read
via "Threatpost | The first stop for security news".
Threat Post
U.S. Government Shutdown Leaves Dozens of .Gov Websites Vulnerable
As the shutdown continues into its 21st day, dozens of .gov websites haven't renewed their TLS certificates.
π΄ Who Takes Responsibility for Cyberattacks in the Cloud? π΄
π Read
via "Dark Reading: ".
A new CSA report addresses the issue of breach responsibility as more organizations move ERP application data the cloud.π Read
via "Dark Reading: ".
Dark Reading
Who Takes Responsibility for Cyberattacks in the Cloud?
A new CSA report addresses the issue of breach responsibility as more organizations move ERP application data the cloud.
β TA505 Crime Gang Debuts Brand-New ServHelper Backdoor β
π Read
via "Threatpost | The first stop for security news".
The latest malware from TA505 has been seen targeting banks, retailers and restaurants with two different versions.π Read
via "Threatpost | The first stop for security news".
Threat Post
TA505 Crime Gang Debuts Brand-New ServHelper Backdoor
The latest malware from TA505 has been seen targeting banks, retailers and restaurants with two different versions.
π΄ 6 Serverless and Containerization Trends CISOs Should Track π΄
π Read
via "Dark Reading: ".
Security leaders must stay on top of a fast-moving world of cloud deployment options.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
π΄ NotPetya Victim Mondelez Sues Zurich Insurance for $100 Million π΄
π Read
via "Dark Reading: ".
Mondelez files lawsuit after Zurich rejects claim for damages from massive ransomware attack.π Read
via "Dark Reading: ".
Dark Reading
NotPetya Victim Mondelez Sues Zurich Insurance for $100 Million
Mondelez files lawsuit after Zurich rejects claim for damages from massive ransomware attack.
ATENTIONβΌ New - CVE-2017-13891
π Read
via "National Vulnerability Database".
In iOS before 11.2, an inconsistent user interface issue was addressed through improved state management.π Read
via "National Vulnerability Database".