β Ep. 015 β USB anti-hacking, bypassing 2FA and government insecurity [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - enjoy!π Read
via "Naked Security".
Naked Security
Ep. 015 β USB anti-hacking, bypassing 2FA and government insecurity [PODCAST]
Hereβs the latest Naked Security podcast β enjoy!
β Did you know you can see the ad boxes Facebook sorts us into? β
π Read
via "Naked Security".
...or that they can edit the (often inaccurate) pigeon-holes Facebook likes to put us in, a study found.π Read
via "Naked Security".
Naked Security
Did you know you can see the ad boxes Facebook sorts us into?
β¦or that they can edit the (often inaccurate) pigeon-holes Facebook likes to put us in, a study found.
β Google cracks down on access to your Android phone and SMS data β
π Read
via "Naked Security".
Android apps that want access to your call and SMS data now have to pass muster with Google's team of reviewers.π Read
via "Naked Security".
Naked Security
Google cracks down on access to your Android phone and SMS data
Android apps that want access to your call and SMS data now have to pass muster with Googleβs team of reviewers.
β Vast data-berg washes up 1.16 billion pwned records β
π Read
via "Naked Security".
Have I Been Pwned? (HIBP) has revealed a huge cache of breached email addresses and passwords, which it has named Collection #1.π Read
via "Naked Security".
π Microsoft launches Azure DevOps bug bounty program, $20,000 rewards on offer π
π Read
via "Security on TechRepublic".
The Redmond giant is keenly interested in remote code execution and privilege escalation flaws.π Read
via "Security on TechRepublic".
π΄ 8 Tips for Monitoring Cloud Security π΄
π Read
via "Dark Reading: ".
Cloud security experts weigh in with the practices and tools they prefer to monitor and measure security metrics in the cloud.π Read
via "Dark Reading: ".
Dark Reading
8 Tips for Monitoring Cloud Security
Cloud security experts weigh in with the practices and tools they prefer to monitor and measure security metrics in the cloud.
π 5 blockchain trends to expect in 2019 π
π Read
via "Security on TechRepublic".
Blockchain may finally be ready to move from hype to reality, with continued IoT integrations and tokenization, according to KPMG.π Read
via "Security on TechRepublic".
TechRepublic
5 blockchain trends to expect in 2019
Blockchain may finally be ready to move from hype to reality, with continued IoT integrations and tokenization, according to KPMG.
β Twitter Android Glitch Exposed Private Tweets for Years β
π Read
via "Threatpost | The first stop for security news".
Twitter has fixed the issue, which has been ongoing since 2014.π Read
via "Threatpost | The first stop for security news".
Threat Post
Twitter Android Glitch Exposed Private Tweets for Years
Twitter has fixed the issue, which has been ongoing since 2014.
π΄ The Rx for HIPAA Compliance in the Cloud π΄
π Read
via "Dark Reading: ".
For medical entities, simply following HIPAA cloud service provider guidelines is no longer enough to ensure that your practice is protected from cyber threats, government investigations, and fines.π Read
via "Dark Reading: ".
Darkreading
The Rx for HIPAA Compliance in the Cloud
For medical entities, simply following HIPAA cloud service provider guidelines is no longer enough to ensure that your practice is protected from cyber threats, government investigations, and fines.
π΄ PCI Council Releases New Software Framework for DevOps Era π΄
π Read
via "Dark Reading: ".
The PCI Software Security Framework will eventually replace PCI DA-DSS when it expires in 2022.π Read
via "Dark Reading: ".
Dark Reading
PCI Council Releases New Software Framework for DevOps Era
The PCI Software Security Framework will eventually replace PCI DA-DSS when it expires in 2022.
π Bug bounty programs: Everything you thought you knew is wrong π
π Read
via "Security on TechRepublic".
One common criticism of bug bounty programs is that very few hackers actually make money. Not only is this untrue, but it misses the point.π Read
via "Security on TechRepublic".
TechRepublic
Bug bounty programs: Everything you thought you knew is wrong
One common criticism of bug bounty programs is that very few hackers actually make money. Not only is this untrue, but it misses the point.
β Critical, Unpatched Cisco Flaw Leaves Small Business Networks Wide Open β
π Read
via "Threatpost | The first stop for security news".
A default configuration allows full admin access to unauthenticated attackers.π Read
via "Threatpost | The first stop for security news".
Threat Post
Critical, Unpatched Cisco Flaw Leaves Small Business Networks Wide Open
A default configuration allows full admin access to unauthenticated attackers.
β Threatpost News Wrap Podcast For Jan. 18 β
π Read
via "Threatpost | The first stop for security news".
Threatpost editors break down the top headlines from the week ended Jan. 18.π Read
via "Threatpost | The first stop for security news".
Threat Post
Threatpost News Wrap Podcast For Jan. 18
Threatpost editors break down the top headlines from the week ended Jan. 18.
π΄ GDPR Suit Filed Against Amazon, Apple π΄
π Read
via "Dark Reading: ".
An Austrian non-profit, led by privacy activist and attorney Max Schrems, has filed suit against 8 tech giants for non-compliance with the EU General Data Protection Regulation.π Read
via "Dark Reading: ".
Dark Reading
GDPR Suit Filed Against Amazon, Apple
An Austrian non-profit, led by privacy activist and attorney Max Schrems, has filed suit against 8 tech giants for non-compliance with the EU General Data Protection Regulation.
β Fallout EK Retools for a Fresh New 2019 Look β
π Read
via "Threatpost | The first stop for security news".
The Fallout EK has added the latest Flash vulnerability to its bad of tricks, among other tune-ups.π Read
via "Threatpost | The first stop for security news".
Threat Post
Fallout EK Retools for a Fresh New 2019 Look
The Fallout EK has added the latest Flash vulnerability to its bad of tricks, among other tune-ups.
β Google Play Removes Malicious Malware-Ridden Apps β
π Read
via "Threatpost | The first stop for security news".
Two apps on Google Play were infecting devices with the Anubis mobile banking trojan.π Read
via "Threatpost | The first stop for security news".
Threat Post
Google Play Removes Malicious Malware-Ridden Apps
Two apps on Google Play were infecting devices with the Anubis mobile banking trojan.
π΄ VC Investments in Cybersecurity Hit Record Highs in 2018 π΄
π Read
via "Dark Reading: ".
But rate of funding appears unsustainable, according to Strategic Cyber Ventures.π Read
via "Dark Reading: ".
Darkreading
VC Investments in Cybersecurity Hit Record Highs in 2018
But rate of funding appears unsustainable, according to Strategic Cyber Ventures.
π΄ 2018's Most Common Vulnerabilities Include Issues New and Old π΄
π Read
via "Dark Reading: ".
The most common vulnerabilities seen last year run the gamut from cross-site scripting to issues with CMS platforms.π Read
via "Dark Reading: ".
Dark Reading
2018's Most Common Vulnerabilities Include Issues New and Old
The most common vulnerabilities seen last year run the gamut from cross-site scripting to issues with CMS platforms.