ATENTIONβΌ New - CVE-2016-10741
π Read
via "National Vulnerability Database".
In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.π Read
via "National Vulnerability Database".
β FaceTime bug, eavesdropping and digital snooping β what to do? [VIDEO] β
π Read
via "Naked Security".
In this week's Naked Security Live video: what to do about microphone-equipped devices in your home?π Read
via "Naked Security".
Naked Security
FaceTime bug, eavesdropping and digital snooping β what to do? [VIDEO]
In this weekβs Naked Security Live video: what to do about microphone-equipped devices in your home?
π How to secure NGINX with Let's Encrypt π
π Read
via "Security on TechRepublic".
If you run NGINX and want to use free certificates, it's possible with Let's Encrypt.π Read
via "Security on TechRepublic".
TechRepublic
How to secure NGINX with Let's Encrypt
If you run NGINX and want to use free certificates, it's possible with Let's Encrypt.
π΄ Nest Hack Leaves Homeowner Sleepless in Chicago π΄
π Read
via "Dark Reading: ".
A Chicago-area family's smart home controls were compromised in a hack that has left them feeling vulnerable in their own home.π Read
via "Dark Reading: ".
Darkreading
Nest Hack Leaves Homeowner Sleepless in Chicago
A Chicago-area family's smart home controls were compromised in a hack that has left them feeling vulnerable in their own home.
ATENTIONβΌ New - CVE-2018-0722
π Read
via "National Vulnerability Database".
Path Traversal vulnerability in Photo Station versions: 5.7.2 and earlier in QTS 4.3.4, 5.4.4 and earlier in QTS 4.3.3, 5.2.8 and earlier in QTS 4.2.6 could allow remote attackers to access sensitive information on the device.π Read
via "National Vulnerability Database".
β Chafer APT Takes Aim at Diplomats in Iran with Improved Custom Malware β
π Read
via "Threatpost | The first stop for security news".
The Remexi spyware has been improved and retooled.π Read
via "Threatpost | The first stop for security news".
Threat Post
Chafer APT Takes Aim at Diplomats in Iran with Improved Custom Malware
The Remexi spyware has been improved and retooled.
π Spectre and Meltdown explained: New variants and more efficient patches π
π Read
via "Security on TechRepublic".
Learn about these uniquely dangerous vulnerabilities as TechRepublic's James Sanders discusses up-to-date info on the latest variants and best mitigation strategies to minimize performance impact.π Read
via "Security on TechRepublic".
TechRepublic
Spectre and Meltdown explained: New variants and more efficient patches
Learn about these uniquely dangerous vulnerabilities as TechRepublic's James Sanders discusses up-to-date info on the latest variants and best mitigation strategies to minimize performance impact.
β Houzz Urges Password Resets After Data Breach β
π Read
via "Threatpost | The first stop for security news".
The decorating website said that account usernames, passwords and more have been compromised as part of a breach.π Read
via "Threatpost | The first stop for security news".
Threat Post
Houzz Urges Password Resets After Data Breach
The decorating website said that account usernames, passwords and more have been compromised as part of a breach.
π How to lock a user account on Cent OS 7 π
π Read
via "Security on TechRepublic".
You can easily prevent unwanted users and attacks from gaining access to your CentOS 7 server.π Read
via "Security on TechRepublic".
TechRepublic
How to lock a user account on Cent OS 7
You can easily prevent unwanted users and attacks from gaining access to your CentOS 7 server.
β Monday review β the hot 28 stories of the week β
π Read
via "Naked Security".
From the DNS outage that deleted users' Azure data to the Nest security cam hijacker, and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 28 stories of the week
From the DNS outage that deleted usersβ Azure data to the Nest security cam hijacker, and everything in between. Itβs weekly roundup time.
β Selling fake likes and follows is illegal, rules New York β
π Read
via "Naked Security".
A groundbreaking settlement in New York finds that selling fake likes and followers is illegal.π Read
via "Naked Security".
Naked Security
Selling fake likes and follows is illegal, rules New York
A groundbreaking settlement in New York finds that selling fake likes and followers is illegal.
β FBI burrowing into North Koreaβs big bad botnet β
π Read
via "Naked Security".
The FBI revealed that it joined the Joanap botnet and started chewing it up from the inside.π Read
via "Naked Security".
Naked Security
FBI burrowing into North Koreaβs big bad botnet
The FBI revealed that it joined the Joanap botnet and started chewing it up from the inside.
β Chromeβs hidden lookalike detection feature battles URL imposters β
π Read
via "Naked Security".
Chrome now checks for misspellings of popular URLs and will display a link to the site that it thinks the user might have wanted to visit.π Read
via "Naked Security".
Naked Security
Chromeβs hidden lookalike detection feature battles URL imposters
Chrome now checks for misspellings of popular URLs and will display a link to the site that it thinks the user might have wanted to visit.
β Security weaknesses in 5G, 4G and 3G could expose usersβ locations β
π Read
via "Naked Security".
Researchers have discovered security holes in 5G, 4G and 3G telephony protocols, which can expose a user's location.π Read
via "Naked Security".
Naked Security
Security weaknesses in 5G, 4G and 3G could expose usersβ locations
Researchers have discovered security holes in 5G, 4G and 3G telephony protocols, which can expose a userβs location.
β SpeakUp Linux Backdoor Sets Up for Major Attack β
π Read
via "Threatpost | The first stop for security news".
Armed with an impressive bag of exploits and other tricks for propagation, researchers believe the new trojan could be the catalyst for an upcoming, major cyber-offensive.π Read
via "Threatpost | The first stop for security news".
Threat Post
SpeakUp Linux Backdoor Sets Up for Major Attack
Armed with an impressive bag of exploits and other tricks for propagation, researchers believe the new trojan could be the catalyst for an upcoming, major cyber-offensive.
π΄ IoT Security's Coming of Age Is Overdue π΄
π Read
via "Dark Reading: ".
The unique threat landscape requires a novel security approach based on the latest advances in network and AI security.π Read
via "Dark Reading: ".
Darkreading
IoT Security's Coming of Age Is Overdue
The unique threat landscape requires a novel security approach based on the latest advances in network and AI security.
β βCollection #1β Data Dump Hacker Identified β
π Read
via "Threatpost | The first stop for security news".
Despite several threat actors stating they are behind a massive 773M credential dump, researchers believe they have found the real distributor.π Read
via "Threatpost | The first stop for security news".
Threat Post
βCollection #1β Data Dump Hacker Identified
Despite several threat actors stating they are behind a massive 773M credential dump, researchers believe they have found the real distributor.
π 3 ways state actors target businesses in cyber warfare, and how to protect yourself π
π Read
via "Security on TechRepublic".
State-sponsored groups are leveraging weaknesses in IoT devices to build botnets, and attacking private industry and public infrastructure in attacks, according to a Booz Allen report.π Read
via "Security on TechRepublic".
TechRepublic
3 ways state actors target businesses in cyber warfare, and how to protect yourself
State-sponsored groups are leveraging weaknesses in IoT devices to build botnets, and attacking private industry and public infrastructure in attacks, according to a Booz Allen report.
π΄ Facebook Struggles in Privacy Class-Action Lawsuit π΄
π Read
via "Dark Reading: ".
Facebook's privacy disclosures "are quite vague" and should have been made more prominent, a federal judge argued.π Read
via "Dark Reading: ".
Dark Reading
Facebook Struggles in Privacy Class-Action Lawsuit
Facebook's privacy disclosures are quite vague and should have been made more prominent, a federal judge argued.
β Spy Campaign Spams Pro-Tibet Group With ExileRAT β
π Read
via "Threatpost | The first stop for security news".
Referencing the Dalai Lama, the spam campaign is targeting recipients of a mailing list run by the Central Tibetan Administration.π Read
via "Threatpost | The first stop for security news".
Threat Post
Spy Campaign Spams Pro-Tibet Group With ExileRAT
Referencing the Dalai Lama, the spam campaign is targeting recipients of a mailing list run by the Central Tibetan Administration.
π΄ Researchers Devise New Method of Intrusion Deception for SDN π΄
π Read
via "Dark Reading: ".
Team from University of Missouri take wraps off Dolus, a system 'defense using pretense' which they say will help defend software-defined networking (SDN) cloud infrastructure.π Read
via "Dark Reading: ".
Dark Reading
Researchers Devise New Method of Intrusion Deception for SDN
Team from University of Missouri take wraps off Dolus, a system 'defense using pretense' which they say will help defend software-defined networking (SDN)
cloud infrastructure.
cloud infrastructure.