π Photos: 10 privacy apps that help mobile users feel safer π
π Read
via "Security on TechRepublic".
If you're worried about privacy on your personal or company-issued mobile device, these 10 apps can help protect your data.π Read
via "Security on TechRepublic".
TechRepublic
Photos: 10 privacy apps that help mobile users feel safer
If you're worried about privacy on your personal or company-issued mobile device, these 10 apps can help protect your data.
β Eight Cryptojacking Apps Booted From Microsoft Store β
π Read
via "Threatpost | The first stop for security news".
The eight apps were secretly stealing victims' CPU power to mine for Monero.π Read
via "Threatpost | The first stop for security news".
Threat Post
Eight Cryptojacking Apps Booted From Microsoft Store
The eight apps were secretly stealing victims' CPU power to mine for Monero.
π΄ Hackers Found Phishing for Facebook Credentials π΄
π Read
via "Dark Reading: ".
A "very realistic-looking" login prompt is designed to capture users' Facebook credentials, researchers report.π Read
via "Dark Reading: ".
Dark Reading
Hackers Found Phishing for Facebook Credentials
A very realistic-looking login prompt is designed to capture users' Facebook credentials, researchers report.
π΄ Staffing Shortage Makes Vulnerabilities Worse π΄
π Read
via "Dark Reading: ".
Businesses don't have sufficient staff to find vulnerabilities or protect against their exploit, according to a new report by Ponemon Institute.π Read
via "Dark Reading: ".
Dark Reading
Staffing Shortage Makes Vulnerabilities Worse
Businesses don't have sufficient staff to find vulnerabilities or protect against their exploit, according to a new report by Ponemon Institute.
ATENTIONβΌ New - CVE-2017-1695
π Read
via "National Vulnerability Database".
IBM QRadar SIEM 7.2 and 7.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 134177.π Read
via "National Vulnerability Database".
π Network recovery advice: Experts weigh in π
π Read
via "Security on TechRepublic".
In the old days, you just had redundant everything, and disaster recovery meant switching over. Not so in the world of cloud computing, security nightmares, and virtual everything.π Read
via "Security on TechRepublic".
TechRepublic
Network recovery advice: Experts weigh in
In the old days, you just had redundant everything, and disaster recovery meant switching over. Not so in the world of cloud computing, security nightmares, and virtual everything.
β Data Breach Bonanza: Dating Apps, Equifax, Mass Credential Dumps β
π Read
via "Threatpost | The first stop for security news".
Data-exposure "lowlights" for the week ending Feb. 15, 2019.π Read
via "Threatpost | The first stop for security news".
Threat Post
Data Breach Bonanza: Dating Apps, Equifax, Mass Credential Dumps
Data-exposure "lowlights" for the week ending Feb. 15, 2019.
ATENTIONβΌ New - CVE-2015-4617
π Read
via "National Vulnerability Database".
Vulnerability in Easy2map-photos WordPress Plugin v1.09 MapPinImageUpload.php and MapPinIconSave.php allows path traversal when specifying file names creating files outside of the upload directory.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-4615
π Read
via "National Vulnerability Database".
Vulnerability in Easy2map-photos WordPress Plugin v1.09 allows SQL Injection via unsanitized mapTemplateName, mapName, mapSettingsXML, parentCSSXML, photoCSSXML, mapCSSXML, mapHTML,mapID variablesπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-5654
π Read
via "National Vulnerability Database".
Vulnerability in YingZhi Python Programming Language v1.9 allows arbitrary anonymous uploads to the phone's storageπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-2565
π Read
via "National Vulnerability Database".
A vulnerability in Mambo CMS v4.6.5 where the scripts thumbs.php, editorFrame.php, editor.php, images.php, manager.php discloses the root path of the webserver.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-2516
π Read
via "National Vulnerability Database".
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.π Read
via "National Vulnerability Database".
β Whereβs the Equifax Data? Does It Matter? β
π Read
via "Threatpost | The first stop for security news".
Threat-hunters say the breached data from the massive Equifax incident is nowhere to be found, indicating a spy job.π Read
via "Threatpost | The first stop for security news".
Threat Post
Whereβs the Equifax Data? Does It Matter?
Threat-hunters say the breached data from the massive Equifax incident is nowhere to be found, indicating a spy job.
ATENTIONβΌ New - CVE-2016-10742
π Read
via "National Vulnerability Database".
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.π Read
via "National Vulnerability Database".
β Monday review β the hot 28 stories of the week β
π Read
via "Naked Security".
From McDonald's hamburglars to 1000-character phishing urls, and everything between. It's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 28 stories of the week
From McDonaldβs hamburglars to 1000-character phishing urls, and everything between. Itβs weekly roundup time.
β Will the EUβs new copyright directive ruin the web? β
π Read
via "Naked Security".
Articles 11 and 13 live on, with the dreaded 'link tax', 'meme killer', 'censorship machine' and all.π Read
via "Naked Security".
Naked Security
Will the EUβs new copyright directive ruin the web?
Articles 11 and 13 live on, with the dreaded βlink taxβ, βmeme killerβ, βcensorship machineβ and all.
β Opera integrates a cryptocurrency wallet β is this Web 3.0? β
π Read
via "Naked Security".
When it appears in the next few weeks, the next version of Opera (βReborn 3β or βR3β) for Windows, Mac and Linux will become the first mainstream desktop browser to integrate a cryptocurrency wallet.π Read
via "Naked Security".
Naked Security
Opera integrates a cryptocurrency wallet β is this Web 3.0?
When it appears in the next few weeks, the next version of Opera (βReborn 3β or βR3β) for Windows, Mac and Linux will become the first mainstream desktop browser to integrate a cryptocurrency walleβ¦
β Mega-crackers back with nearly 100 million new stolen data records β
π Read
via "Naked Security".
Sounds like the crooks who tried to sell more than 600 million records last week are back with nearly 100 million more...π Read
via "Naked Security".
Naked Security
Mega-crackers back with nearly 100 million new stolen data records
Sounds like the crooks who tried to sell more than 600 million records last week are back with nearly 100 million moreβ¦
π΄ Privacy Ops: The New Nexus for CISOs & DPOs π΄
π Read
via "Dark Reading: ".
No longer can privacy be an isolated function managed by legal or compliance departments with little or no connection to the organization's underlying security technology.π Read
via "Dark Reading: ".
Darkreading
Privacy Ops: The New Nexus for CISOs & DPOs
No longer can privacy be an isolated function managed by legal or compliance departments with little or no connection to the organization's underlying security technology.
βοΈ I Am Not Associated with Swift Recovery Ltd. βοΈ
π Read
via "Schneier on Security".
It seems that someone from a company called Swift Recovery Ltd. is impersonating me -- at least on Telegram. The person is using a photo of me, and is using details of my life available on Wikipedia to convince people that they are me.They are not.If anyone has any more information -- stories, screen shots of chats, etc. -- please forward them to me.
π Read
via "Schneier on Security".
β When Cyberattacks Pack a Physical Punch β
π Read
via "Threatpost | The first stop for security news".
Physical security goes hand in hand with cyberdefense. What happens when β as we see all too often β the physical side is overlooked?π Read
via "Threatpost | The first stop for security news".
Threat Post
When Cyberattacks Pack a Physical Punch
Physical security goes hand in hand with cyberdefense. What happens when β as we see all too often β the physical side is overlooked?