β Digital signs left wide open with default password β
π Read
via "Naked Security".
One thing the world doesn't need: hackers who can broadcast to billboards of any size, be they PC monitor- or Godzilla-sized.π Read
via "Naked Security".
Naked Security
Digital signs left wide open with default password
One thing the world doesnβt need: hackers who can broadcast to billboards of any size, be they PC monitor- or Godzilla-sized.
β Just two hacker groups are behind 60% of stolen cryptocurrency β
π Read
via "Naked Security".
Chainalysis found that two groups, which it calls Alpha and Beta, are responsible for stealing around $1 billion in funds from exchanges.π Read
via "Naked Security".
Naked Security
Just two hacker groups are behind 60% of stolen cryptocurrency
Chainalysis found that two groups, which it calls Alpha and Beta, are responsible for stealing around $1 billion in funds from exchanges.
β Firefox 66 will silence autoplaying web audio β
π Read
via "Naked Security".
From Firefox 66 for desktop and Android, due in March, media autoplay of video or audio will be blocked by default.π Read
via "Naked Security".
Naked Security
Firefox 66 will silence autoplaying web audio
From Firefox 66 for desktop and Android, due in March, media autoplay of video or audio will be blocked by default.
β Jackβd dating app is showing usersβ intimate pics to strangers β
π Read
via "Naked Security".
A clear and present danger: Anyone with a web browser who knows where to look can access Jack'd users' photos, be they private or public.π Read
via "Naked Security".
Naked Security
Jackβd dating app is showing usersβ intimate pics to strangers
A clear and present danger: Anyone with a web browser who knows where to look can access Jackβd usersβ photos, be they private or public.
π΄ 7 Tips For Communicating With the Board π΄
π Read
via "Dark Reading: ".
The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk.π Read
via "Dark Reading: ".
Dark Reading
7 Tips For Communicating With the Board
The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk.
β Modern Cybercrime: It Takes a Village β
π Read
via "Threatpost | The first stop for security news".
Today's financial cyber-rings have corporate insider and management roles -- cybercrime is not just just for hackers and coders anymore.π Read
via "Threatpost | The first stop for security news".
Threat Post
Modern Cybercrime: It Takes a Village
Today's financial cyber-rings have corporate insider and management roles β cybercrime is not just just for hackers and coders anymore.
π 4 tips to keep your business safe online, according to Google π
π Read
via "Security on TechRepublic".
Most people still lack an understanding of best practices for passwords and other security measures, Google found.π Read
via "Security on TechRepublic".
TechRepublic
4 tips to keep your business safe online, according to Google
Most people still lack an understanding of best practices for passwords and other security measures, Google found.
π Data breaches, GDPR lead 54% of companies to increase IT security spending π
π Read
via "Security on TechRepublic".
One in three companies is still unprepared for many potential cybersecurity threats, according to an eSecurityPlanet.com report.π Read
via "Security on TechRepublic".
TechRepublic
Data breaches, GDPR lead 54% of companies to increase IT security spending
One in three companies is still unprepared for many potential cybersecurity threats, according to an eSecurityPlanet.com report.
β Microsoft Confirms Serious βPrivExchangeβ Vulnerability β
π Read
via "Threatpost | The first stop for security news".
The elevated privilege flaw exists in Microsoft Exchange and would allow a remote attacker to impersonate an administrator.π Read
via "Threatpost | The first stop for security news".
Threat Post
Microsoft Confirms Serious βPrivExchangeβ Vulnerability
The elevated privilege flaw exists in Microsoft Exchange and would allow a remote attacker to impersonate an administrator.
π΄ Serverless Computing: 'Function' vs. 'Infrastructure' as-a-Service π΄
π Read
via "Dark Reading: ".
How much do companies really gain from offloading security duties to the cloud? Let's do the math.π Read
via "Dark Reading: ".
Darkreading
Serverless Computing: 'Function' vs. 'Infrastructure' as-a-Service
How much do companies really gain from offloading security duties to the cloud? Let's do the math.
π 3 things businesses need to know about customer privacy expectations π
π Read
via "Security on TechRepublic".
After a data breach, 57% of consumers blame companies above everyone else, even hackers, for the event, according to an RSA Security report.π Read
via "Security on TechRepublic".
TechRepublic
3 things businesses need to know about customer privacy expectations
After a data breach, 57% of consumers blame companies above everyone else, even hackers, for the event, according to an RSA Security report.
β What are Data Manipulation Attacks, and How to Mitigate Against Them β
π Read
via "Threatpost | The first stop for security news".
Hackers don't always steal data. Sometimes the goal is to manipulate the data to intentionally trigger external events that can be capitalized on.π Read
via "Threatpost | The first stop for security news".
Threat Post
What are Data Manipulation Attacks, and How to Mitigate Against Them
Hackers don't always steal data. Sometimes the goal is to manipulate the data to intentionally trigger external events that can be capitalized on.
π Attention developers: Google wants to pay you $15,000 to improve cloud security π
π Read
via "Security on TechRepublic".
Google's Confidential Computing Challenge aims to make it easier to achieve end-to-end encryption of data in the cloud.π Read
via "Security on TechRepublic".
TechRepublic
Attention developers: Google wants to pay you $15,000 to improve cloud security
Google's Confidential Computing Challenge aims to make it easier to achieve end-to-end encryption of data in the cloud.
β Clever Phishing Attack Enlists Google Translate to Spoof Facebook Login Page β
π Read
via "Threatpost | The first stop for security news".
A tricky two-stage phishing scam is targeting Facebook and Google credentials using a landing page that hides behind Google's translate feature.π Read
via "Threatpost | The first stop for security news".
Threat Post
Clever Phishing Attack Enlists Google Translate to Spoof Login Page
A tricky two-stage phishing scam is targeting Facebook and Google credentials using a landing page that hides behind Google's translate feature.
π΄ 4 Practical Questions to Ask Before Investing in AI π΄
π Read
via "Dark Reading: ".
A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.π Read
via "Dark Reading: ".
Darkreading
4 Practical Questions to Ask Before Investing in AI
A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.
π΄ Consumers Care About Security - Sometimes π΄
π Read
via "Dark Reading: ".
New RSA Security survey shows a generation gap in concerns over cybersecurity and privacy.π Read
via "Dark Reading: ".
Darkreading
Consumers Care About Security - Sometimes
New RSA Security survey shows a generation gap in concerns over cybersecurity and privacy.
ATENTIONβΌ New - CVE-2015-9282
π Read
via "National Vulnerability Database".
The Pie Chart Panel plugin through 2019-01-02 for Grafana is vulnerable to XSS via legend data or tooltip data. When a chart is included in a Grafana dashboard, this vulnerability could allow an attacker to gain remote unauthenticated access to the dashboard.π Read
via "National Vulnerability Database".
π΄ Some Airline Flight Online Check-in Links Expose Passenger Data π΄
π Read
via "Dark Reading: ".
Several airlines send unencrypted links to passengers for flight check-in that could be intercepted by attackers to view passenger and other data, researchers found.π Read
via "Dark Reading: ".
Darkreading
Some Airline Flight Online Check-in Links Expose Passenger Data
Several airlines send unencrypted links to passengers for flight check-in that could be intercepted by attackers to view passenger and other data, researchers found.
π΄ Google Tackles Gmail Spam with Tensorflow π΄
π Read
via "Dark Reading: ".
Tensorflow, Google's open-source machine learning framework, has been used to block 100 million spam messages.π Read
via "Dark Reading: ".
Dark Reading
Google Tackles Gmail Spam with Tensorflow
Tensorflow, Google's open-source machine learning framework, has been used to block 100 million spam messages.
π΄ HelpSystems Buys Core Security Assets to Grow Infosec Portfolio π΄
π Read
via "Dark Reading: ".
Acquisition will enable it to provide threat detection, pen testing, and other security tools to customers.π Read
via "Dark Reading: ".
Dark Reading
HelpSystems Buys Core Security Assets to Grow Infosec Portfolio
Acquisition will enable it to provide threat detection, pen testing, and other security tools to customers.
β MacOS Zero-Day Exposes Apple Keychain Passwords β
π Read
via "Threatpost | The first stop for security news".
A researcher who discovered a flaw letting him steal passwords in MacOS is not sharing his findings with Apple without a macOS bug bounty program.π Read
via "Threatpost | The first stop for security news".
Threat Post
MacOS Zero-Day Exposes Apple Keychain Passwords
A researcher who discovered a flaw letting him steal passwords in MacOS is not sharing his findings with Apple without a macOS bug bounty program.