β Change your password! VoIP provider leaves huge database exposed online β
π Read
via "Naked Security".
A researcher has discovered an exposed database containing gigabytes of call logs, SMS data, and internal system credentials belonging to US Voice-over-IP (VoIP) service provider VOIPo.com.π Read
via "Naked Security".
Naked Security
Change your password! VoIP provider leaves huge database exposed online
A researcher has discovered an exposed database containing gigabytes of call logs, SMS data, and internal system credentials belonging to US Voice-over-IP (VoIP) service provider VOIPo.com.
β Microsoft font gives away forgery in bankruptcy case β
π Read
via "Naked Security".
In a case that could be straight out of a legal TV drama, a computing font has cost a couple two houses in a Canadian bankruptcy case.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Cryptomining Malware Uninstalls Cloud Security Products β
π Read
via "Threatpost | The first stop for security news".
New samples of cryptomining malware performs a never-before-seen function: uninstalling cloud security products.π Read
via "Threatpost | The first stop for security news".
Threat Post
Cryptomining Malware Uninstalls Cloud Security Products
New samples of cryptomining malware performs a never-before-seen function: uninstalling cloud security products.
β Email crooks swindle woman out of $150K from home sale β
π Read
via "Naked Security".
She sent her bank account details three times, she said. Unfortunately, they wound up in crooks' hands, and her money wound up in their pockets.π Read
via "Naked Security".
Naked Security
Email crooks swindle woman out of $150K from home sale
She sent her bank account details three times, she said. Unfortunately, they wound up in crooksβ hands, and her money wound up in their pockets.
π΄ Simulating Lateral Attacks Through Email π΄
π Read
via "Dark Reading: ".
A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.π Read
via "Dark Reading: ".
Darkreading
Simulating Lateral Attacks Through Email
A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.
β Cyber-Jackpot: 773M Credentials Dumped on the Dark Web β
π Read
via "Threatpost | The first stop for security news".
Thousands of individual breaches make up the database, one of the largest troves of stolen credentials ever seen.π Read
via "Threatpost | The first stop for security news".
Threat Post
Cyber-Jackpot: 773M Credentials Dumped on the Dark Web
Thousands of individual breaches make up the database, one of the largest troves of stolen credentials ever seen.
π Malware can now evade cloud security tools, as cybercriminals target public cloud users π
π Read
via "Security on TechRepublic".
Refined malware payloads from Chinese threat actor Rocke Group are sidestepping security tools to install cryptocurrency miners on cloud systems.π Read
via "Security on TechRepublic".
TechRepublic
Malware can now evade cloud security tools, as cybercriminals target public cloud users
Refined malware payloads from Chinese threat actor Rocke Group are sidestepping security tools to install cryptocurrency miners on cloud systems.
ATENTIONβΌ New - CVE-2017-2411 (iphone_os)
π Read
via "National Vulnerability Database".
In iOS before 11.2, exchange rates were retrieved from HTTP rather than HTTPS. This was addressed by enabling HTTPS for exchange rates.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-13889 (mac_os_x)
π Read
via "National Vulnerability Database".
In macOS High Sierra before 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan, a logic error existed in the validation of credentials. This was addressed with improved credential validation.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-13888 (iphone_os)
π Read
via "National Vulnerability Database".
In iOS before 11.2, a type confusion issue was addressed with improved memory handling.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-7576 (iphone_os)
π Read
via "National Vulnerability Database".
In iOS before 9.3.3, a memory corruption issue existed in the kernel. This issue was addressed through improved memory handling.π Read
via "National Vulnerability Database".
π΄ 'We Want IoT Security Regulation,' Say 95% of IT Decision-Makers π΄
π Read
via "Dark Reading: ".
New global survey shows businesses are valuing IoT security more highly, but they are still challenged by IoT data visibility and privacy.π Read
via "Dark Reading: ".
Dark Reading
'We Want IoT Security Regulation,' Say 95% of IT Decision-Makers
New global survey shows businesses are valuing IoT security more highly, but they are still challenged by IoT data visibility and privacy.
ATENTIONβΌ New - CVE-2017-13891 (iphone_os)
π Read
via "National Vulnerability Database".
In iOS before 11.2, an inconsistent user interface issue was addressed through improved state management.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-4642 (apple_tv, iphone_os, mac_os)
π Read
via "National Vulnerability Database".
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, proxy authentication incorrectly reported HTTP proxies received credentials securely. This issue was addressed through improved warnings.π Read
via "National Vulnerability Database".
π β4 ways to prepare for GDPR and similar privacy regulations π
π Read
via "Security on TechRepublic".
Data privacy is no longer a nice-to-have security commodity, but a must-have commodity.π Read
via "Security on TechRepublic".
TechRepublic
β4 ways to prepare for GDPR and similar privacy regulations
Data privacy is no longer a nice-to-have security commodity, but a must-have commodity.
π How to connect to VNC using SSH π
π Read
via "Security on TechRepublic".
If your network doesn't allow connections into the default VNC port 5901, you can tunnel it through SSH.π Read
via "Security on TechRepublic".
TechRepublic
How to connect to VNC using SSH
If your network doesn't allow connections into the default VNC port 5901, you can tunnel it through SSH.
ATENTIONβΌ New - CVE-2016-4644 (apple_tv, iphone_os, mac_os)
π Read
via "National Vulnerability Database".
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, a downgrade issue existed with HTTP authentication credentials saved in Keychain. This issue was addressed by storing the authentication types with the credentials.π Read
via "National Vulnerability Database".
π Over 87GB of email addresses and passwords exposed in Collection 1 dump π
π Read
via "Security on TechRepublic".
An 87GB dump of email addresses and passwords containing almost 773 million unique addresses and just under 22 million unique passwords has been found.π Read
via "Security on TechRepublic".
TechRepublic
Over 87GB of email addresses and passwords exposed in Collection 1 dump
An 87GB dump of email addresses and passwords containing almost 773 million unique addresses and just under 22 million unique passwords has been found.
π΄ The Security Perimeter Is Dead; Long Live the New Endpoint Perimeter π΄
π Read
via "Dark Reading: ".
The network no longer provides an air gap against external threats, but access devices can take up the slack.π Read
via "Dark Reading: ".
Darkreading
The Security Perimeter Is Dead; Long Live the New Endpoint Perimeter
The network no longer provides an air gap against external threats, but access devices can take up the slack.
π΄ Go Hands-On with New Security Tricks at Black Hat Asia π΄
π Read
via "Dark Reading: ".
Get up close and personal with the latest tools and techniques for testing (and breaking) everything from HTTPS to deep neural networks to Microsoft Office!π Read
via "Dark Reading: ".
Dark Reading
Black Hat
The Global Leader in Cybersecurity Events & Trainings
β Apple CEO Demands Federal Data Privacy Legislation β
π Read
via "Threatpost | The first stop for security news".
Apple CEO Tim Cook has called on the government to double down on data privacy regulation in 2019.π Read
via "Threatpost | The first stop for security news".
Threat Post
Apple CEO Demands Federal Data Privacy Legislation
Apple CEO Tim Cook has called on the government to double down on data privacy regulation in 2019.