β Ep. 019 β Android holes, iOS screengrabbing and USB poo [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - enjoy!π Read
via "Naked Security".
Naked Security
Ep. 019 β Android holes, iOS screengrabbing and USB poo [PODCAST]
Hereβs the latest Naked Security podcast β enjoy!
π More developers are abusing Apple Developer Enterprise Program to distribute illicit apps π
π Read
via "Security on TechRepublic".
Apple has less of an iron grip over iOS than first thought, as organizations are using the Developer Enterprise Program for apps that would not be allowed in the App Store.π Read
via "Security on TechRepublic".
TechRepublic
More developers are abusing Apple Developer Enterprise Program to distribute illicit apps
Apple has less of an iron grip over iOS than first thought, as organizations are using the Developer Enterprise Program for apps that would not be allowed in the App Store.
β Unpatched Apple macOS Hole Exposes Safari Browsing History β
π Read
via "Threatpost | The first stop for security news".
There are no permission dialogues for apps in certain folders for macOS Mojave, which allows a malicious app to spy on browsing histories..π Read
via "Threatpost | The first stop for security news".
Threat Post
Unpatched Apple macOS Hole Exposes Safari Browsing History
Apple has since acknowledged the flaw.
β βDirty Sockβ Flaw in snapd Allows Root Access to Linux Servers β
π Read
via "Threatpost | The first stop for security news".
The issue affects default installations of Ubuntu Server and Desktop and is likely included in many Ubuntu-like Linux distributions.π Read
via "Threatpost | The first stop for security news".
Threat Post
βDirty Sockβ Flaw in snapd Allows Root Access to Linux Servers
The issue affects default installations of Ubuntu Server and Desktop and is likely included in many Ubuntu-like Linux distributions.
β Evil USB O.MG Cable opens up Wi-Fi to remote attacks β
π Read
via "Naked Security".
... and enables de-authenticaton attacks that could knock targeted systems off the Wi-Fi and onto one of these nefarious cables.π Read
via "Naked Security".
Naked Security
Evil USB O.MG cable opens up Wi-Fi to remote attacks
β¦ and enables de-authenticaton attacks that could knock targeted systems off the Wi-Fi and onto one of these nefarious cables.
β Another flaw found in macOS Mojaveβs privacy protection β
π Read
via "Naked Security".
Ever since Apple announced enhanced privacy protection for macOS Mojave 10.14 last September, a dedicated band of researchers has been poking away at it looking for security flaws. Here's another.π Read
via "Naked Security".
Naked Security
Another flaw found in macOS Mojaveβs privacy protection
Ever since Apple announced enhanced privacy protection for macOS Mojave 10.14 last September, a dedicated band of researchers has been poking away at it looking for security flaws. Hereβs anoβ¦
π΄ Lessons Learned from a Hard-Hitting Security Review π΄
π Read
via "Dark Reading: ".
Information security is a corporate posture and must be managed at all levels: systems, software, personnel, and all the key processes.π Read
via "Dark Reading: ".
Dark Reading
Lessons Learned from a Hard-Hitting Security Review
Information security is a corporate posture and must be managed at all levels: systems, software, personnel, and all the key processes.
π΄ 70% of Consumers Want Biometrics in the Workplace π΄
π Read
via "Dark Reading: ".
Speed, simplicity, and security underscore their desire, a new study shows.π Read
via "Dark Reading: ".
Dark Reading
70% of Consumers Want Biometrics in the Workplace
Speed, simplicity, and security underscore their desire, a new study shows.
π How to protect and secure your web browsing with the Brave browser π
π Read
via "Security on TechRepublic".
The Brave browser offers built-in protection against ad trackers, third-party cookies, and other potential threats to your privacy. Here's how to use it and tweak it.π Read
via "Security on TechRepublic".
TechRepublic
How to protect and secure your web browsing with the Brave browser
The Brave browser offers built-in protection against ad trackers, third-party cookies, and other potential threats to your privacy. Here's how to use it and tweak it.
π How to create a home office VPN server with Microsoft Azure π
π Read
via "Security on TechRepublic".
Creating a do-it-yourself VPN that you manage and access on your own terms is not as difficult as you might think.π Read
via "Security on TechRepublic".
ATENTIONβΌ New - CVE-2018-0696
π Read
via "National Vulnerability Database".
OpenAM (Open Source Edition) 13.0 and later does not properly manage sessions, which allows remote authenticated attackers to change the security questions and reset the login password via unspecified vectors.π Read
via "National Vulnerability Database".
π΄ 5 Expert Tips for Complying with the New PCI Software Security Framework π΄
π Read
via "Dark Reading: ".
The Secure SLC Standard improves business efficiency for payment application vendors but could also stand as new security benchmark for other industries to follow.π Read
via "Dark Reading: ".
Dark Reading
5 Expert Tips for Complying with the New PCI Software Security Framework
The Secure SLC Standard improves business efficiency for payment application vendors but could also stand as new security benchmark for other industries to follow.
π΄ Scammers Fall in Love with Valentine's Day π΄
π Read
via "Dark Reading: ".
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.π Read
via "Dark Reading: ".
Darkreading
Scammers Fall in Love with Valentine's Day
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.
π΄ Researchers Dig into Microsoft Office Functionality Flaws π΄
π Read
via "Dark Reading: ".
An ongoing study investigating security bugs in Microsoft Office has so far led to two security patches.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π©πΏπ» Breached Healthcare Records Tripled in 2018 π©πΏπ»
via "Subscriber Blog RSS Feed ".
There was at least one health data breach a day and 503 health data breaches overall in 2018 according to analysis released this week.
π Readvia "Subscriber Blog RSS Feed ".
Digital Guardian
Breached Healthcare Records Tripled in 2018
There was at least one health data breach a day and 503 health data breaches overall in 2018 according to analysis released this week.
β ThreatList: Banking Trojans Are Still The Top Big Bad for Email β
π Read
via "Threatpost | The first stop for security news".
Banking trojans, led by the ever-changing Emotet, dominated the email-borne threat landscape in Q4, according to Proofpoint.π Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: Banking Trojans Are Still The Top Big Bad for Email
Banking trojans, led by the ever-changing Emotet, dominated the email-borne threat landscape in Q4, according to Proofpoint.
π΄ Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues π΄
π Read
via "Dark Reading: ".
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.π Read
via "Dark Reading: ".
Dark Reading
Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.
β Lenovo Watch X Riddled with Security Vulnerabilities β
π Read
via "Threatpost | The first stop for security news".
Researchers have identified multiple security issues with this Lenovo smartwatch.π Read
via "Threatpost | The first stop for security news".
Threat Post
Lenovo Watch X Riddled with Security Vulnerabilities
Researchers have identified multiple security issues with this Lenovo smartwatch.
π΄ Windows Executable Masks Mac Malware π΄
π Read
via "Dark Reading: ".
A new strain of MacOS malware hides inside a Windows executable to avoid detection.π Read
via "Dark Reading: ".
Darkreading
Windows Executable Masks Mac Malware
A new strain of MacOS malware hides inside a Windows executable to avoid detection.
π΄ 2018 Was Second-Most Active Year for Data Breaches π΄
π Read
via "Dark Reading: ".
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.π Read
via "Dark Reading: ".
Darkreading
2018 Was Second-Most Active Year for Data Breaches
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.
β Top tips for Valentineβs Day β and the rest of the year! [VIDEO] β
π Read
via "Naked Security".
Our top tips for Valentine's Day and beyond - all in just 5 minutes. Enjoy!π Read
via "Naked Security".
Naked Security
Top tips for Valentineβs Day β and the rest of the year! [VIDEO]
Our top tips for Valentineβs Day and beyond β all in just 5 minutes. Enjoy!