π΄ Some Airline Flight Online Check-in Links Expose Passenger Data π΄
π Read
via "Dark Reading: ".
Several airlines send unencrypted links to passengers for flight check-in that could be intercepted by attackers to view passenger and other data, researchers found.π Read
via "Dark Reading: ".
Darkreading
Some Airline Flight Online Check-in Links Expose Passenger Data
Several airlines send unencrypted links to passengers for flight check-in that could be intercepted by attackers to view passenger and other data, researchers found.
π΄ Google Tackles Gmail Spam with Tensorflow π΄
π Read
via "Dark Reading: ".
Tensorflow, Google's open-source machine learning framework, has been used to block 100 million spam messages.π Read
via "Dark Reading: ".
Dark Reading
Google Tackles Gmail Spam with Tensorflow
Tensorflow, Google's open-source machine learning framework, has been used to block 100 million spam messages.
π΄ HelpSystems Buys Core Security Assets to Grow Infosec Portfolio π΄
π Read
via "Dark Reading: ".
Acquisition will enable it to provide threat detection, pen testing, and other security tools to customers.π Read
via "Dark Reading: ".
Dark Reading
HelpSystems Buys Core Security Assets to Grow Infosec Portfolio
Acquisition will enable it to provide threat detection, pen testing, and other security tools to customers.
β MacOS Zero-Day Exposes Apple Keychain Passwords β
π Read
via "Threatpost | The first stop for security news".
A researcher who discovered a flaw letting him steal passwords in MacOS is not sharing his findings with Apple without a macOS bug bounty program.π Read
via "Threatpost | The first stop for security news".
Threat Post
MacOS Zero-Day Exposes Apple Keychain Passwords
A researcher who discovered a flaw letting him steal passwords in MacOS is not sharing his findings with Apple without a macOS bug bounty program.
π΄ Attacks on Automotive Systems Feared Likely π΄
π Read
via "Dark Reading: ".
Yet few engineers feel empowered to do anything about them, a survey shows.π Read
via "Dark Reading: ".
Dark Reading
Attacks on Automotive Systems Feared Likely
Yet few engineers feel empowered to do anything about them, a survey shows.
π΄ New Google Extension Takes Aim at Password Security π΄
π Read
via "Dark Reading: ".
A Google/Harris Poll finds nearly two-thirds of users surveyed reuse passwords on multiple accounts.π Read
via "Dark Reading: ".
Dark Reading
New Chrome Extension Takes Aim at Password Security
A Google/Harris Poll finds nearly two-thirds of users surveyed reuse passwords on multiple accounts.
β Unlimited crypotocurrency? Zcash fixes counterfeiting flaw β
π Read
via "Naked Security".
Privacy-focused cryptocurrency Zcash has fixed a flaw that would have allowed anyone with knowledge of it to produce counterfeit currency.π Read
via "Naked Security".
Naked Security
Unlimited crypotocurrency? Zcash fixes counterfeiting flaw
Privacy-focused cryptocurrency Zcash has fixed a flaw that would have allowed anyone with knowledge of it to produce counterfeit currency.
β Chrome extension warns users their login credentials have been breached β
π Read
via "Naked Security".
Google's released a Chrome extension, Password Checkup, that's designed to warn users when they enter a username and password the company has detected in a data breach.π Read
via "Naked Security".
Naked Security
Chrome extension warns users their login credentials have been breached
Googleβs released a Chrome extension, Password Checkup, thatβs designed to warn users when they enter a username and password the company has detected in a data breach.
β Anyone want to lay claim to the USB drive found in seal poo? β
π Read
via "Naked Security".
It still works, you know. And there are photos and videos on it.π Read
via "Naked Security".
Naked Security
Anyone want to lay claim to the USB drive found in seal poo?
It still works, you know. And there are photos and videos on it.
β KeySteal could allow someone to steal your Apple Keychain passwords β
π Read
via "Naked Security".
The researcher says it works without root or administrator privileges and without password prompts. But he's not revealing how it works to Apple because there's no money for him in its invite-only/iOS-only bounties.π Read
via "Naked Security".
Naked Security
KeySteal could allow someone to steal your Apple Keychain passwords
The researcher says it works without root or administrator privileges and without password prompts. But heβs not revealing how it works to Apple because thereβs no money for him in its β¦
π΄ Master the Latest Exploits and Security Vulnerabilities at Black Hat Asia π΄
π Read
via "Dark Reading: ".
In cybersecurity it pays to stay on top of the latest exploits, and there's no better place to do that than Black Hat Asia in Singapore next month.π Read
via "Dark Reading: ".
Dark Reading
Master the Latest Exploits and Security Vulnerabilities at Black Hat Asia
In cybersecurity it pays to stay on top of the latest exploits, and there's no better place to do that than Black Hat Asia in Singapore next month.
π΄ DDoS Mitigation Pioneer Launches Network Security Startup π΄
π Read
via "Dark Reading: ".
Barrett Lyon is co-founder of Netography, which emerged today with $2.6M in seed funding from Andreessen Horowitz.π Read
via "Dark Reading: ".
Darkreading
DDoS Mitigation Pioneer Launches Network Security Startup
Barrett Lyon is co-founder of Netography, which emerged today with $2.6M in seed funding from Andreessen Horowitz.
π΄ When 911 Goes Down: Why Voice Network Security Must Be a Priority π΄
π Read
via "Dark Reading: ".
When there's a DDoS attack against your voice network, are you ready to fight against it?π Read
via "Dark Reading: ".
Darkreading
When 911 Goes Down: Why Voice Network Security Must Be a Priority
When there's a DDoS attack against your voice network, are you ready to fight against it?
β Flaw in Multiple Airline Systems Exposes Passenger Data β
π Read
via "Threatpost | The first stop for security news".
Up to eight airlines do not encrypt e-ticketing booking systems - leaving personal customer data open for the taking.π Read
via "Threatpost | The first stop for security news".
Threat Post
Flaw in Multiple Airline Systems Exposes Passenger Data
Up to eight airlines do not encrypt e-ticketing booking systems - leaving personal customer data open for the taking.
β Serious Security: Post-Quantum Cryptography (and why weβre getting it) β
π Read
via "Naked Security".
Traditional computers work with binary digits, or bits as they are called for short, that are either zero or one. Typically, zero and one are represented by some traditional physical property β a hole punched in a tape, or no hole; a metal disc tilted left or right by an electric current; an electronic capacitor [β¦]π Read
via "Naked Security".
Naked Security
Serious Security: Post-Quantum Cryptography (and why weβre getting it)
Hereβs why NIST is running a competition to find algorithms for a Post-Quantum Cryptographic worldβ¦
π Malicious URLs outnumbered attachments in emails 3 to 1 last year π
π Read
via "Security on TechRepublic".
The end of 2018 saw a spike in malicious attachments which businesses need to be wary of, according to a Proofpoint report.π Read
via "Security on TechRepublic".
TechRepublic
Malicious URLs outnumbered attachments in emails 3 to 1 last year
The end of 2018 saw a spike in malicious attachments which businesses need to be wary of, according to a Proofpoint report.
π΄ Security Bugs in Video Chat Tools Enable Remote Attackers π΄
π Read
via "Dark Reading: ".
Lifesize is issuing a hotfix to address vulnerabilities in its enterprise collaboration devices, which could give hackers a gateway into target organizations.π Read
via "Dark Reading: ".
Darkreading
Security Bugs in Video Chat Tools Enable Remote Attackers
Lifesize is issuing a hotfix to address vulnerabilities in its enterprise collaboration devices, which could give hackers a gateway into target organizations.
π΄ 4 Payment Security Trends for 2019 π΄
π Read
via "Dark Reading: ".
Visa's chief risk officer anticipates some healthy changes ahead.π Read
via "Dark Reading: ".
Dark Reading
4 Payment Security Trends for 2019
Visa's chief risk officer anticipates some healthy changes ahead.
β ThreatList: Latest DDoS Trends by the Numbers β
π Read
via "Threatpost | The first stop for security news".
Trends in DDoS attacks show a evolution beyond Mirai code and point to next-gen botnets that are better hidden and have a greater level of persistence on devices β making them "far more dangerous."π Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: Latest DDoS Trends by the Numbers
Trends in DDoS attacks show a evolution beyond Mirai code and point to next-gen botnets that are better hidden and have a greater level of persistence on devices β making them "far more dangerous".
β Apple Fixes Pesky FaceTime Bug in iOS 12.1.4 Update β
π Read
via "Threatpost | The first stop for security news".
Apple's iOS 12.1.4 fixes a FaceTime bug that made headlines last week.π Read
via "Threatpost | The first stop for security news".
Threat Post
Apple Fixes Pesky FaceTime Bug in iOS 12.1.4 Update
Apple's iOS 12.1.4 fixes a FaceTime bug that made headlines last week.
π΄ Apple Patches Group FaceTime Flaw π΄
π Read
via "Dark Reading: ".
Teenaged Fortnite player gets credit for finding the bug.π Read
via "Dark Reading: ".
Dark Reading
Apple Patches Group FaceTime Flaw
Teenaged Fortnite player gets credit for finding the bug.