β Hackers unleash social media worm after bug report ignored β
π Read
via "Naked Security".
Is it ok to launch a benign proof of concept that you know will go wide, to bring a flaw to people's attention, or should you stay quiet?π Read
via "Naked Security".
Naked Security
Hackers unleash social media worm after bug report ignored
Is it ok to launch a benign proof of concept that you know will go wide, to bring a flaw to peopleβs attention, or should you stay quiet?
β Facebook tracks users it thinks may harm its employees β
π Read
via "Naked Security".
Threat makers are sometimes geolocated to determine how credible their threats are, as in, are they near enough to really attack?π Read
via "Naked Security".
Naked Security
Facebook tracks users it thinks may harm its employees
Threat makers are sometimes geolocated to determine how credible their threats are, as in, are they near enough to really attack?
β Ep. 020 β Leaky containers, careless coders and risky USB cables [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast... enjoy!π Read
via "Naked Security".
Naked Security
Ep. 020 β Leaky containers, careless coders and risky USB cables [PODCAST]
Hereβs the latest Naked Security podcastβ¦ enjoy!
π΄ Prep for The Next Cybersecurity Arms Race at Black Hat Asia π΄
π Read
via "Dark Reading: ".
Don't miss out on some of the world-class Briefings and Trainings on offer for cybersecurity professionals concerned about the most pressing threats of 2019.π Read
via "Dark Reading: ".
Dark Reading
Prep for The Next Cybersecurity Arms Race at Black Hat Asia
Don't miss out on some of the world-class Briefings and Trainings on offer for cybersecurity professionals concerned about the most pressing threats of 2019.
π How to help CISOs understand their role in cloud security π
π Read
via "Security on TechRepublic".
Some 90% of CISOs are confused about their role in securing a SaaS environment, according to an Oracle and KPMG report.π Read
via "Security on TechRepublic".
TechRepublic
How to help CISOs understand their role in cloud security
Some 90% of CISOs are confused about their role in securing a SaaS environment, according to an Oracle and KPMG report.
π΄ The Anatomy of a Lazy Phish π΄
π Read
via "Dark Reading: ".
A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.π Read
via "Dark Reading: ".
Darkreading
The Anatomy of a Lazy Phish
A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.
β Microsoft: Russiaβs Fancy Bear Working to Influence EU Elections β
π Read
via "Threatpost | The first stop for security news".
As hundreds of millions of Europeans prepare to go to the polls in May, Fancy Bear ramps up cyber-espionage and disinformation efforts.π Read
via "Threatpost | The first stop for security news".
Threat Post
Microsoft: Russiaβs Fancy Bear Working to Influence EU Elections
As hundreds of millions of Europeans prepare to go to the polls in May, Fancy Bear ramps up cyber-espionage and disinformation efforts.
π΄ Microsoft Expands AccountGuard to Help Europe Prep for Cyberattacks π΄
π Read
via "Dark Reading: ".
A recent wave of cybercrime has targeted organizations with employees in Belgium, France, Germany, Poland, Romania, and Serbia.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β GitHub Increases Rewards, Scope For Bug-Bounty Program β
π Read
via "Threatpost | The first stop for security news".
GitHub is offering unlimited rewards for critical vulnerabilities - and has added "safe harbor" terms to its bug bounty program.π Read
via "Threatpost | The first stop for security news".
Threat Post
GitHub Increases Rewards, Scope For Bug-Bounty Program
GitHub is offering unlimited rewards for critical vulnerabilities - and has added "safe harbor" terms to its bug bounty program.
β Password Manager Firms Blast Back at βLeaky Passwordβ Revelations β
π Read
via "Threatpost | The first stop for security news".
1Password, Dashlane, KeePass and LastPass each downplay what researchers say is a flaw in how the utilities manage memory.π Read
via "Threatpost | The first stop for security news".
Threat Post
Password Manager Firms Blast Back at βLeaky Passwordβ Revelations
1Password, Dashlane, KeePass and LastPass each downplay what researchers say is a flaw in how the utilities manage memory.
π΄ 9 Years After: From Operation Aurora to Zero Trust π΄
π Read
via "Dark Reading: ".
How the first documented nation-state cyberattack is changing security today.π Read
via "Dark Reading: ".
Darkreading
9 Years After: From Operation Aurora to Zero Trust
How the first documented nation-state cyberattack is changing security today.
π Former Coke, Eastman Employee Stole Chemical Formulas: Report π
π Read
via "Subscriber Blog RSS Feed ".
Prosecutors say that as part of a conspiracy to steal trade secrets, the Chinese-born scientist stole data related to bisphenol-A-free food packaging worth $120M.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Former Coke, Eastman Employee Stole Chemical Formulas: Report
Prosecutors say that as part of a conspiracy to steal trade secrets, the Chinese-born scientist stole data related to bisphenol-A-free food packaging worth $120M.
β Appleβs Shazam App Boots Facebook Ads and Other Third-Party SDKs β
π Read
via "Threatpost | The first stop for security news".
The music-recognition app that Apple bought for $400 million is removing Facebook Ads, DoubleClick, Facebook Analytics and more.π Read
via "Threatpost | The first stop for security news".
Threat Post
Appleβs Shazam App Boots Facebook Ads and Other Third-Party SDKs
The music-recognition app that Apple bought for $400 million is removing Facebook Ads, DoubleClick, Facebook Analytics and more.
π΄ POS Vendor Announces January Data Breach π΄
π Read
via "Dark Reading: ".
More than 120 restaurants were affected by an incident that exposed customer credit card information.π Read
via "Dark Reading: ".
Darkreading
POS Vendor Announces January Data Breach
More than 120 restaurants were affected by an incident that exposed customer credit card information.
β Separ Malware Plucks Hundreds of Companiesβ Credentials in Ongoing Phish β
π Read
via "Threatpost | The first stop for security news".
An ongoing phishing campaign is targeting hundreds of businesses to steal their email and browser credentials using a simply - but effective - malware.π Read
via "Threatpost | The first stop for security news".
Threat Post
Separ Malware Plucks Hundreds of Companiesβ Credentials in Ongoing Phish
An ongoing phishing campaign is targeting hundreds of businesses to steal their email and browser credentials using a simply - but effective - malware.
π΄ Mastercard, GCA Create Small Business Cybersecurity Toolkit π΄
π Read
via "Dark Reading: ".
A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.π Read
via "Dark Reading: ".
Darkreading
Mastercard, GCA Create Small Business Cybersecurity Toolkit
A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.
β Researcher: Not Hard for a Hacker to Capsize a Ship at Sea β
π Read
via "Threatpost | The first stop for security news".
Maritime transport still contributes in an important way to the worldβs economy, with on-time shipments influencing everything from commodities availability and spot pricing to the stability of small countries. Unfortunately, capsizing a ship with a cyberattack is a relatively low-skill enterprise, according to an analysis from Pen Test Partners. With so many previously outlined ways [β¦]π Read
via "Threatpost | The first stop for security news".
Threat Post
Researcher: Not Hard for a Hacker to Capsize a Ship at Sea
Capsizing a ship with a cyberattack is a relatively low-skill enterprise, according to an analysis from Pen Test Partners.
π Best practices for handling gaps in cloud security π
π Read
via "Security on TechRepublic".
Establishing sufficient cloud security is a complex challenge. Learn where your attention is best directed to achieve the best results.π Read
via "Security on TechRepublic".
TechRepublic
Best practices for handling gaps in cloud security
Establishing sufficient cloud security is a complex challenge. Learn where your attention is best directed to achieve the best results.
π΄ As Businesses Move Critical Data to Cloud, Security Risks Abound π΄
π Read
via "Dark Reading: ".
Companies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues.π Read
via "Dark Reading: ".
Darkreading
As Businesses Move Critical Data to Cloud, Security Risks Abound
Companies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues.
β Can you really sniff out gas station card skimmers with your phone? β
π Read
via "Naked Security".
A viral post suggests (wrongly) that card skimmers always use Bluetooth. Anyway, just looking at nearby Bluetooth names doesn't help much...π Read
via "Naked Security".
Naked Security
Can you really sniff out gas station card skimmers with your phone?
A viral post suggests (wrongly) that card skimmers always use Bluetooth. Anyway, just looking at nearby Bluetooth names doesnβt help muchβ¦
π΄ Insurer Offers GDPR-Specific Coverage for SMBs π΄
π Read
via "Dark Reading: ".
Companies covered under the EU mandate can get policies for up to $10 million for fines, penalties, and other costs.π Read
via "Dark Reading: ".
Dark Reading
Insurer Offers GDPR-Specific Coverage for SMBs
Companies covered under the EU mandate can get policies for up to $10 million for fines, penalties, and other costs.