π΄ EternalBlue Infections Persist π΄
π Read
via "Dark Reading: ".
Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.π Read
via "Dark Reading: ".
Dark Reading
EternalBlue Infections Persist
Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.
β E.U.: Tech Giants Face Big Fines, 1 Hour Limit to Remove Extremist Content β
π Read
via "The first stop for security news | Threatpost ".
The rules would apply to all hosting service providers offering services in the E.U., regardless of size, even if theyβre not based there.π Read
via "The first stop for security news | Threatpost ".
Threat Post
E.U.: Tech Giants Face Big Fines, 1 Hour Limit to Remove Extremist Content
The rules would apply to all hosting service providers offering services in the E.U., regardless of size, even if theyβre not based there.
π΄ How Secure are our Voting Systems for November 2018? π΄
π Read
via "Dark Reading: ".
Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the country's highly decentralized voting systems to safeguard the integrity of upcoming elections.π Read
via "Dark Reading: ".
Dark Reading
How Secure are our Voting Systems for November 2018?
Anomali CEO Hugh Njemanze discusses the importance of sharing threat intelligence across the country's highly decentralized voting systems to safeguard the integrity of upcoming elections.
β Researchers Heat Up Cold-Boot Attack That Works on All Laptops β
π Read
via "The first stop for security news | Threatpost ".
The attack bypasses BIOS mitigations for cold-boot compromise on models from Apple, Dell, Lenovo and all others made in the last 10 years.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Researchers Heat Up Cold-Boot Attack That Works on All Laptops
The attack bypasses BIOS mitigations for cold-boot compromise on models from Apple, Dell, Lenovo and all others made in the last 10 years.
π 5 ways to block spam calls π
π Read
via "Security on TechRepublic".
Annoying spam calls are on the rise, and here's how to block 'em, explains TechRepublic's Tom Merrittπ Read
via "Security on TechRepublic".
TechRepublic
Top 5 ways to block spam calls
Those annoying spam calls are on the rise. Tom Merritt has five solutions.
β Monday review β the hot 25 stories of the week β
π Read
via "Naked Security".
From the hidden camera found in an AirBnb room and the smart TVs now admitting to viewers they spied on them to Google Chrome creating passwords for you, and more!π Read
via "Naked Security".
Naked Security
Monday review β the hot 25 stories of the week
From the hidden camera found in an AirBnb room and the smart TVs now admitting to viewers they spied on them to Google Chrome creating passwords for you, and more!
β Facebookβs robot coders step into the future of programming β
π Read
via "Naked Security".
Like a good junior programmer, Facebook's AI is cutting its teeth with a bit of bug fixing.π Read
via "Naked Security".
Naked Security
Facebookβs robot coders step into the future of programming
Like a good junior programmer, Facebookβs AI is cutting its teeth with a bit of bug fixing.
β On the hook! Phishing trip nets βBarbaraβ 5 years and whopping fine β
π Read
via "Naked Security".
The romance and business email compromise scammer pled guilty to fraud amounting to $25m.π Read
via "Naked Security".
Naked Security
On the hook! Phishing trip nets βBarbaraβ 5 years and whopping fine
The romance and business email compromise scammer pled guilty to fraud amounting to $25m.
β Deepfake pics and videos set off Facebookβs fake news detector β
π Read
via "Naked Security".
The social network is expanding its effort to stamp out fake news.π Read
via "Naked Security".
Naked Security
Deepfake pics and videos set off Facebookβs fake news detector
The social network is expanding its effort to stamp out fake news.
π Top 5 ways to block spam calls π
π Read
via "Security on TechRepublic".
Those annoying spam calls are on the rise, but TechRepublic's Tom Merritt has 5 solutionsπ Read
via "Security on TechRepublic".
TechRepublic
Top 5 ways to block spam calls
Those annoying spam calls are on the rise. Tom Merritt has five solutions.
β Vote now! Which web browser do you trust the most? β
π Read
via "Naked Security".
Your web browser goes with you everywhere on the web. But how much do you trust it?π Read
via "Naked Security".
Naked Security
Vote now! Which web browser do you trust the most?
Your web browser goes with you everywhere on the web. But how much do you trust it?
π΄ The 7 Habits of Highly Effective Security Teams π΄
π Read
via "Dark Reading: ".
Security requires smart people, processes, and technology. Too often, the "people" portion of the PPT equation is neglected.π Read
via "Dark Reading: ".
Dark Reading
The 7 Habits of Highly Effective Security Teams
Security requires smart people, processes, and technology. Too often, the people portion of the PPT equation is neglected.
β CSS-Based Attack Causes iOS, macOS Devices to Crash β
π Read
via "The first stop for security news | Threatpost ".
The attack stems from a glitch in WebKit, an HTML layout browser engine in Appleβs Safari browser.π Read
via "The first stop for security news | Threatpost ".
Threat Post
CSS-Based Attack Causes iOS, macOS Devices to Crash
The attack stems from a glitch in WebKit, an HTML layout browser engine in Appleβs Safari browser.
ATENTIONβΌ New - CVE-2017-15705
π Read
via "National Vulnerability Database".
A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed tags in emails that cause markup to be handled incorrectly leading to scan timeouts. In Apache SpamAssassin, using HTML::Parser, we setup an object and hook into the begin and end tag event handlers In both cases, the "open" event is immediately followed by a "close" event - even if the tag *does not* close in the HTML being parsed. Because of this, we are missing the "text" event to deal with the object normally. This can cause carefully crafted emails that might take more scan time than expected leading to a Denial of Service. The issue is possibly a bug or design decision in HTML::Parser that specifically impacts the way Apache SpamAssassin uses the module with poorly formed html. The exploit has been seen in the wild but not believed to have been purposefully part of a Denial of Service attempt. We are concerned that there may be attempts to abuse the vulnerability in the future.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-9045
π Read
via "National Vulnerability Database".
A code execution vulnerability exists in ProcessMaker Enterprise Core 3.0.1.7-community. A specially crafted web request can cause unsafe deserialization potentially resulting in PHP code being executed. An attacker can send a crafted web parameter to trigger this vulnerability.π Read
via "National Vulnerability Database".
π΄ Ransomware Takes Down Airport's Flight Information Screens π΄
π Read
via "Dark Reading: ".
The attack left airport staff to post flight times and gates on whiteboards at Bristol Airport in Britain.π Read
via "Dark Reading: ".
Darkreading
Ransomware Takes Down Airport's Flight Information Screens
The attack left airport staff to post flight times and gates on whiteboards at Bristol Airport in Britain.
β Old WordPress Plugin Being Exploited in RCE Attacks β
π Read
via "The first stop for security news | Threatpost ".
Old instances of the popular WordPress Duplicator Plugin are leaving sites open to remote code execution attacks.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Old WordPress Plugin Being Exploited in RCE Attacks
Old instances of the popular WordPress Duplicator Plugin are leaving sites open to remote code execution attacks.
β Facebook Now Offers Bounties For Access Token Exposure β
π Read
via "The first stop for security news | Threatpost ".
The newly expanded Facebook bug bounty program sniffs out access token exposure flaws.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Facebook Now Offers Bounties For Access Token Exposure
The newly expanded Facebook bug bounty program sniffs out access token exposure flaws.
ATENTIONβΌ New - CVE-2017-2777
π Read
via "National Vulnerability Database".
An exploitable heap overflow vulnerability exists in the ipStringCreate function of Iceni Argus Version 6.6.05. A specially crafted pdf file can cause an integer overflow resulting in heap overflow. An attacker can send file to trigger this vulnerability.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-14443
π Read
via "National Vulnerability Database".
An exploitable information leak vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly checks the number of GET parameters supplied, leading to an arbitrarily controlled information leak on the whole device memory. An attacker can send an authenticated HTTP request to trigger this vulnerability.π Read
via "National Vulnerability Database".
π΄ Yahoo Class-Action Suits Set for Settlement π΄
π Read
via "Dark Reading: ".
Altaba tells SEC it will incur $47 million to settle consumer litigation for massive Yahoo data breaches.π Read
via "Dark Reading: ".
Darkreading
Yahoo Class-Action Suits Set for Settlement
Altaba tells SEC it will incur $47 million to settle consumer litigation for massive Yahoo data breaches.