π΄ 70% of Consumers Want Biometrics in the Workplace π΄
π Read
via "Dark Reading: ".
Speed, simplicity, and security underscore their desire, a new study shows.π Read
via "Dark Reading: ".
Dark Reading
70% of Consumers Want Biometrics in the Workplace
Speed, simplicity, and security underscore their desire, a new study shows.
π How to protect and secure your web browsing with the Brave browser π
π Read
via "Security on TechRepublic".
The Brave browser offers built-in protection against ad trackers, third-party cookies, and other potential threats to your privacy. Here's how to use it and tweak it.π Read
via "Security on TechRepublic".
TechRepublic
How to protect and secure your web browsing with the Brave browser
The Brave browser offers built-in protection against ad trackers, third-party cookies, and other potential threats to your privacy. Here's how to use it and tweak it.
π How to create a home office VPN server with Microsoft Azure π
π Read
via "Security on TechRepublic".
Creating a do-it-yourself VPN that you manage and access on your own terms is not as difficult as you might think.π Read
via "Security on TechRepublic".
ATENTIONβΌ New - CVE-2018-0696
π Read
via "National Vulnerability Database".
OpenAM (Open Source Edition) 13.0 and later does not properly manage sessions, which allows remote authenticated attackers to change the security questions and reset the login password via unspecified vectors.π Read
via "National Vulnerability Database".
π΄ 5 Expert Tips for Complying with the New PCI Software Security Framework π΄
π Read
via "Dark Reading: ".
The Secure SLC Standard improves business efficiency for payment application vendors but could also stand as new security benchmark for other industries to follow.π Read
via "Dark Reading: ".
Dark Reading
5 Expert Tips for Complying with the New PCI Software Security Framework
The Secure SLC Standard improves business efficiency for payment application vendors but could also stand as new security benchmark for other industries to follow.
π΄ Scammers Fall in Love with Valentine's Day π΄
π Read
via "Dark Reading: ".
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.π Read
via "Dark Reading: ".
Darkreading
Scammers Fall in Love with Valentine's Day
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.
π΄ Researchers Dig into Microsoft Office Functionality Flaws π΄
π Read
via "Dark Reading: ".
An ongoing study investigating security bugs in Microsoft Office has so far led to two security patches.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π©πΏπ» Breached Healthcare Records Tripled in 2018 π©πΏπ»
via "Subscriber Blog RSS Feed ".
There was at least one health data breach a day and 503 health data breaches overall in 2018 according to analysis released this week.
π Readvia "Subscriber Blog RSS Feed ".
Digital Guardian
Breached Healthcare Records Tripled in 2018
There was at least one health data breach a day and 503 health data breaches overall in 2018 according to analysis released this week.
β ThreatList: Banking Trojans Are Still The Top Big Bad for Email β
π Read
via "Threatpost | The first stop for security news".
Banking trojans, led by the ever-changing Emotet, dominated the email-borne threat landscape in Q4, according to Proofpoint.π Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: Banking Trojans Are Still The Top Big Bad for Email
Banking trojans, led by the ever-changing Emotet, dominated the email-borne threat landscape in Q4, according to Proofpoint.
π΄ Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues π΄
π Read
via "Dark Reading: ".
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.π Read
via "Dark Reading: ".
Dark Reading
Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.
β Lenovo Watch X Riddled with Security Vulnerabilities β
π Read
via "Threatpost | The first stop for security news".
Researchers have identified multiple security issues with this Lenovo smartwatch.π Read
via "Threatpost | The first stop for security news".
Threat Post
Lenovo Watch X Riddled with Security Vulnerabilities
Researchers have identified multiple security issues with this Lenovo smartwatch.
π΄ Windows Executable Masks Mac Malware π΄
π Read
via "Dark Reading: ".
A new strain of MacOS malware hides inside a Windows executable to avoid detection.π Read
via "Dark Reading: ".
Darkreading
Windows Executable Masks Mac Malware
A new strain of MacOS malware hides inside a Windows executable to avoid detection.
π΄ 2018 Was Second-Most Active Year for Data Breaches π΄
π Read
via "Dark Reading: ".
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.π Read
via "Dark Reading: ".
Darkreading
2018 Was Second-Most Active Year for Data Breaches
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.
β Top tips for Valentineβs Day β and the rest of the year! [VIDEO] β
π Read
via "Naked Security".
Our top tips for Valentine's Day and beyond - all in just 5 minutes. Enjoy!π Read
via "Naked Security".
Naked Security
Top tips for Valentineβs Day β and the rest of the year! [VIDEO]
Our top tips for Valentineβs Day and beyond β all in just 5 minutes. Enjoy!
π Burnout warning: High stress levels impacting CISOs' physical, mental health π
π Read
via "Security on TechRepublic".
Increasing pressure, hefty workloads, and budgetary deficits have significant negative effects on CISOs worldwide, according to a Nominet report.π Read
via "Security on TechRepublic".
TechRepublic
Burnout warning: High stress levels impacting CISOs' physical, mental health
Increasing pressure, hefty workloads, and budgetary deficits have significant negative effects on CISOs worldwide, according to a Nominet report.
β Update now! Microsoft and Adobeβs February 2019 Patch Tuesday is here β
π Read
via "Naked Security".
Internet Explorer (IE) may have launched way back in 1995 but nearly a quarter of a century later itβs still creating work for Microsoft and Windows users.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Google paid out $3.4m in bug bounties last year β
π Read
via "Naked Security".
317 researchers from 78 countries turned 2018 into a worldwide bug-crunching spree.π Read
via "Naked Security".
Naked Security
Google paid out $3.4m in bug bounties last year
317 researchers from 78 countries turned 2018 into a worldwide bug-crunching spree.
β Apple App Store stuffed with hardcore porn and gambling apps β
π Read
via "Naked Security".
The apps, which violate content policies, got in there via the same Enterprise Certificate program that Facebook and Google exploited.π Read
via "Naked Security".
Naked Security
Apple phone users targeted with hardcore porn and gambling apps
The apps, which violate content policies, got in there via the same Enterprise Certificate program that Facebook and Google exploited.
β Critical OkCupid Flaw Exposes Daters to App Takeovers β
π Read
via "Threatpost | The first stop for security news".
The flaw is only one of many romance-related security issues as bad actors take advantage of Valentine's Day.π Read
via "Threatpost | The first stop for security news".
Threat Post
Critical OkCupid Flaw Exposes Daters to App Takeovers
The flaw is only one of many romance-related scams as bad actors take advantage of Valentine's Day.
β Whatβs behind this 1,000-character phishing URL? β
π Read
via "Naked Security".
Bleeping Computer learned of a strange phishing campaign which uses an unusually long URL - but why?π Read
via "Naked Security".
Naked Security
Whatβs behind this 1,000-character phishing URL?
Bleeping Computer learned of a strange phishing campaign which uses an unusually long URL β but why?
π΄ Learn New Malware-Fighting Tools & Techniques at Black Hat Asia π΄
π Read
via "Dark Reading: ".
There's no better place to brush up on the latest malware than Black Hat Asia in Singapore next month with a cornucopia of practical Trainings, Briefings, and Arsenal tool demos.π Read
via "Dark Reading: ".
Dark Reading
Learn New Malware-Fighting Tools & Techniques at Black Hat Asia
There's no better place to brush up on the latest malware than Black Hat Asia in Singapore next month with a cornucopia of practical Trainings, Briefings, and Arsenal tool demos.