β ThreatList: Banking Trojans Are Still The Top Big Bad for Email β
π Read
via "Threatpost | The first stop for security news".
Banking trojans, led by the ever-changing Emotet, dominated the email-borne threat landscape in Q4, according to Proofpoint.π Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: Banking Trojans Are Still The Top Big Bad for Email
Banking trojans, led by the ever-changing Emotet, dominated the email-borne threat landscape in Q4, according to Proofpoint.
π΄ Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues π΄
π Read
via "Dark Reading: ".
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.π Read
via "Dark Reading: ".
Dark Reading
Ex-US Intel Officer Charged with Helping Iran Target Her Former Colleagues
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers.
β Lenovo Watch X Riddled with Security Vulnerabilities β
π Read
via "Threatpost | The first stop for security news".
Researchers have identified multiple security issues with this Lenovo smartwatch.π Read
via "Threatpost | The first stop for security news".
Threat Post
Lenovo Watch X Riddled with Security Vulnerabilities
Researchers have identified multiple security issues with this Lenovo smartwatch.
π΄ Windows Executable Masks Mac Malware π΄
π Read
via "Dark Reading: ".
A new strain of MacOS malware hides inside a Windows executable to avoid detection.π Read
via "Dark Reading: ".
Darkreading
Windows Executable Masks Mac Malware
A new strain of MacOS malware hides inside a Windows executable to avoid detection.
π΄ 2018 Was Second-Most Active Year for Data Breaches π΄
π Read
via "Dark Reading: ".
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.π Read
via "Dark Reading: ".
Darkreading
2018 Was Second-Most Active Year for Data Breaches
Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.
β Top tips for Valentineβs Day β and the rest of the year! [VIDEO] β
π Read
via "Naked Security".
Our top tips for Valentine's Day and beyond - all in just 5 minutes. Enjoy!π Read
via "Naked Security".
Naked Security
Top tips for Valentineβs Day β and the rest of the year! [VIDEO]
Our top tips for Valentineβs Day and beyond β all in just 5 minutes. Enjoy!
π Burnout warning: High stress levels impacting CISOs' physical, mental health π
π Read
via "Security on TechRepublic".
Increasing pressure, hefty workloads, and budgetary deficits have significant negative effects on CISOs worldwide, according to a Nominet report.π Read
via "Security on TechRepublic".
TechRepublic
Burnout warning: High stress levels impacting CISOs' physical, mental health
Increasing pressure, hefty workloads, and budgetary deficits have significant negative effects on CISOs worldwide, according to a Nominet report.
β Update now! Microsoft and Adobeβs February 2019 Patch Tuesday is here β
π Read
via "Naked Security".
Internet Explorer (IE) may have launched way back in 1995 but nearly a quarter of a century later itβs still creating work for Microsoft and Windows users.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Google paid out $3.4m in bug bounties last year β
π Read
via "Naked Security".
317 researchers from 78 countries turned 2018 into a worldwide bug-crunching spree.π Read
via "Naked Security".
Naked Security
Google paid out $3.4m in bug bounties last year
317 researchers from 78 countries turned 2018 into a worldwide bug-crunching spree.
β Apple App Store stuffed with hardcore porn and gambling apps β
π Read
via "Naked Security".
The apps, which violate content policies, got in there via the same Enterprise Certificate program that Facebook and Google exploited.π Read
via "Naked Security".
Naked Security
Apple phone users targeted with hardcore porn and gambling apps
The apps, which violate content policies, got in there via the same Enterprise Certificate program that Facebook and Google exploited.
β Critical OkCupid Flaw Exposes Daters to App Takeovers β
π Read
via "Threatpost | The first stop for security news".
The flaw is only one of many romance-related security issues as bad actors take advantage of Valentine's Day.π Read
via "Threatpost | The first stop for security news".
Threat Post
Critical OkCupid Flaw Exposes Daters to App Takeovers
The flaw is only one of many romance-related scams as bad actors take advantage of Valentine's Day.
β Whatβs behind this 1,000-character phishing URL? β
π Read
via "Naked Security".
Bleeping Computer learned of a strange phishing campaign which uses an unusually long URL - but why?π Read
via "Naked Security".
Naked Security
Whatβs behind this 1,000-character phishing URL?
Bleeping Computer learned of a strange phishing campaign which uses an unusually long URL β but why?
π΄ Learn New Malware-Fighting Tools & Techniques at Black Hat Asia π΄
π Read
via "Dark Reading: ".
There's no better place to brush up on the latest malware than Black Hat Asia in Singapore next month with a cornucopia of practical Trainings, Briefings, and Arsenal tool demos.π Read
via "Dark Reading: ".
Dark Reading
Learn New Malware-Fighting Tools & Techniques at Black Hat Asia
There's no better place to brush up on the latest malware than Black Hat Asia in Singapore next month with a cornucopia of practical Trainings, Briefings, and Arsenal tool demos.
π΄ Security Spills: 9 Problems Causing the Most Stress π΄
π Read
via "Dark Reading: ".
Security practitioners reveal what's causing them the most frustration in their roles.π Read
via "Dark Reading: ".
Dark Reading
Security Spills: 9 Problems Causing the Most Stress
Security practitioners reveal what's causing them the most frustration in their roles.
π Pirates found abusing Apple Developer Enterprise Program to distribute modified apps π
π Read
via "Security on TechRepublic".
Following revelations that Facebook, Google, Amazon, as well as purveyors of illicit content are abusing the Developer Enterprise Program, new reports show pirates are as well. Who's left?π Read
via "Security on TechRepublic".
TechRepublic
Pirates found abusing Apple Developer Enterprise Program to distribute modified apps
Following revelations that Facebook, Google, Amazon, as well as purveyors of illicit content are abusing the Developer Enterprise Program, new reports show pirates are as well. Who's left?
π΄ How to Create a Dream Team for the New Age of Cybersecurity π΄
π Read
via "Dark Reading: ".
When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.π Read
via "Dark Reading: ".
Darkreading
How to Create a Dream Team for the New Age of Cybersecurity
When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.
β Google Play Cracks Down on Malicious Apps β
π Read
via "Threatpost | The first stop for security news".
Google Play said that app suspensions increased by 66 percent in 2018 on its platform.π Read
via "Threatpost | The first stop for security news".
Threat Post
Google Play Cracks Down on Malicious Apps
Google Play said that app suspensions increased by 66 percent in 2018 on its platform.
β Inside a GandCrab targeted ransomware attack on a hospital β
π Read
via "Naked Security".
A recent attack on a US hospital gives us a colourful picture of both how a targeted ransomware attack happens, and how it can be stopped.π Read
via "Naked Security".
Naked Security
Inside a GandCrab targeted ransomware attack on a hospital
A recent attack on a US hospital gives us a colourful picture of both how a targeted ransomware attack happens, and how it can be stopped.
β Coffee Meets Bagel Dating App Warns Users of Breach β
π Read
via "Threatpost | The first stop for security news".
The dating site said users' names and email addresses that were added to the system prior to May 2018 may be impacted.π Read
via "Threatpost | The first stop for security news".
Threat Post
Coffee Meets Bagel Dating App Warns Users of Breach
The dating site said users' names and email addresses that were added to the system prior to May 2018 may be impacted.
β Threatpost Poll: Over Half of Firms Asked Struggle with Mobile Security β
π Read
via "Threatpost | The first stop for security news".
A Threatpost poll found that 52 percent don't feel prepared to prevent a mobile security incident from happening. The results reflect a challenging mobile security landscape.π Read
via "Threatpost | The first stop for security news".
Threat Post
Threatpost Poll Data: Over Half of Firms Asked Struggle with Mobile Security
A Threatpost poll found that 52 percent don't feel prepared to prevent a mobile security incident from happening. The results reflect a challenging mobile security landscape.
β Ever-Changing Emotet Evolves Again with Fresh Evasion Tactic β
π Read
via "Threatpost | The first stop for security news".
It has added the technique of using malicious XML files as its delivery method.π Read
via "Threatpost | The first stop for security news".
Threat Post
Ever-Changing Emotet Evolves Again with Fresh Evasion Tactic
It has added the technique of using malicious XML files as its delivery method.