โ Appleโs Shazam App Boots Facebook Ads and Other Third-Party SDKs โ
๐ Read
via "Threatpost | The first stop for security news".
The music-recognition app that Apple bought for $400 million is removing Facebook Ads, DoubleClick, Facebook Analytics and more.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Appleโs Shazam App Boots Facebook Ads and Other Third-Party SDKs
The music-recognition app that Apple bought for $400 million is removing Facebook Ads, DoubleClick, Facebook Analytics and more.
๐ด POS Vendor Announces January Data Breach ๐ด
๐ Read
via "Dark Reading: ".
More than 120 restaurants were affected by an incident that exposed customer credit card information.๐ Read
via "Dark Reading: ".
Darkreading
POS Vendor Announces January Data Breach
More than 120 restaurants were affected by an incident that exposed customer credit card information.
โ Separ Malware Plucks Hundreds of Companiesโ Credentials in Ongoing Phish โ
๐ Read
via "Threatpost | The first stop for security news".
An ongoing phishing campaign is targeting hundreds of businesses to steal their email and browser credentials using a simply - but effective - malware.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Separ Malware Plucks Hundreds of Companiesโ Credentials in Ongoing Phish
An ongoing phishing campaign is targeting hundreds of businesses to steal their email and browser credentials using a simply - but effective - malware.
๐ด Mastercard, GCA Create Small Business Cybersecurity Toolkit ๐ด
๐ Read
via "Dark Reading: ".
A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.๐ Read
via "Dark Reading: ".
Darkreading
Mastercard, GCA Create Small Business Cybersecurity Toolkit
A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.
โ Researcher: Not Hard for a Hacker to Capsize a Ship at Sea โ
๐ Read
via "Threatpost | The first stop for security news".
Maritime transport still contributes in an important way to the worldโs economy, with on-time shipments influencing everything from commodities availability and spot pricing to the stability of small countries. Unfortunately, capsizing a ship with a cyberattack is a relatively low-skill enterprise, according to an analysis from Pen Test Partners. With so many previously outlined ways [โฆ]๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Researcher: Not Hard for a Hacker to Capsize a Ship at Sea
Capsizing a ship with a cyberattack is a relatively low-skill enterprise, according to an analysis from Pen Test Partners.
๐ Best practices for handling gaps in cloud security ๐
๐ Read
via "Security on TechRepublic".
Establishing sufficient cloud security is a complex challenge. Learn where your attention is best directed to achieve the best results.๐ Read
via "Security on TechRepublic".
TechRepublic
Best practices for handling gaps in cloud security
Establishing sufficient cloud security is a complex challenge. Learn where your attention is best directed to achieve the best results.
๐ด As Businesses Move Critical Data to Cloud, Security Risks Abound ๐ด
๐ Read
via "Dark Reading: ".
Companies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues.๐ Read
via "Dark Reading: ".
Darkreading
As Businesses Move Critical Data to Cloud, Security Risks Abound
Companies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues.
โ Can you really sniff out gas station card skimmers with your phone? โ
๐ Read
via "Naked Security".
A viral post suggests (wrongly) that card skimmers always use Bluetooth. Anyway, just looking at nearby Bluetooth names doesn't help much...๐ Read
via "Naked Security".
Naked Security
Can you really sniff out gas station card skimmers with your phone?
A viral post suggests (wrongly) that card skimmers always use Bluetooth. Anyway, just looking at nearby Bluetooth names doesnโt help muchโฆ
๐ด Insurer Offers GDPR-Specific Coverage for SMBs ๐ด
๐ Read
via "Dark Reading: ".
Companies covered under the EU mandate can get policies for up to $10 million for fines, penalties, and other costs.๐ Read
via "Dark Reading: ".
Dark Reading
Insurer Offers GDPR-Specific Coverage for SMBs
Companies covered under the EU mandate can get policies for up to $10 million for fines, penalties, and other costs.
ATENTIONโผ New - CVE-2018-15380
๐ Read
via "National Vulnerability Database".
A vulnerability in the cluster service manager of Cisco HyperFlex Software could allow an unauthenticated, adjacent attacker to execute commands as the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting to the cluster service manager and injecting commands into the bound process. A successful exploit could allow the attacker to run commands on the affected host as the root user. This vulnerability affects Cisco HyperFlex Software releases prior to 3.5(2a).๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2013-7469
๐ Read
via "National Vulnerability Database".
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.๐ Read
via "National Vulnerability Database".
<b>⛓ Unsupervised Learning: No. 165 ⛓</b>
<code>Media</code><code>Unsupervised Learning is my weekly show where I spend 5-20 hours finding the most interesting stories in security, technology, and humans, which I then curate into a 30-minute podcast & companion newsletter.</code><code>The goal is to catch you up on current events, show you the best content from around the web, and hopefully give you something to think about as well.</code><code>Subscribe to the Newsletter or Podcast</code><code>🛡️ Security News
🔥 The OpenAI team created an algorithm that can write news stories so well that they are refusing to release it due to potential use to create fake news. I get what theyโre doing, but the odds of this not being co-developed by many other groups is close to zero over a span of months. Hereโs an example of a fake story it wrote about national security, and it did this on its second try with just a few words of seeding by a human. Link
People are concerned that Twitter may not be actually deleting DMs when you delete them. Someone pulled their data archive from Twitter and found their own deleted DMs. Itโs a good reminder that itโs a good policy to just consider anything you do online to be permanent. Link
Trend Micro and the Ponemon Institute created a Cyber Risk Index, which ranks from -10 to 10. Strangely, the lower the number the better, even though itโs called a Risk Index. And if you put that in a graph from left to right, the right side is better than the left side. I couldnโt even get into the way they built the numbers because Iโm forced to assume that process was as bad as the interface. The whole purpose of a system like this is to be used by others, so how could you possibly make such bad choices on the UI? Link
Someone found an open Chinese database online that was being used to track the location of millions of Uyghurs in the country. Between this, the re-education camp, the mass-surveillance and social credit system, the nation-wide censorship firewall, and their colonization of Africa, itโs obvious theyโre willing to do anything to win at this real-life game of Civiilization. Theโve become morally belligerent. Link
Drones will soon require visible license plates. Link
Switzerland is doing a bug bounty on their e-voting system. Link
The Pentagon is worried about China and Russia fielding ground-based lasers that can blind and otherwise disable U.S. satellites. Link
Advisories: Ubiquiti Device DDoS Potential, 75 Adobe Vulnerabilities, Android App Tracking, SAP HANA,
Leaks: 620 Million Records For Sale on Dark Web
⚙️ Technology News
If you refresh this website youโll get a human face, except theyโre not real humansโtheyโre AI generated. Importantly, itโs not a collection of pre-made images getting loaded. Theyโre all generated on the fly. Link
Chinese phones now make up a third of the European market, and Huawei has the top position. Link
One in six Americans wear a smartwatch. Link
👧🏼 Human News
Student debt thatโs 90 or more days delinquent is now at $166 billion dollarsโwhich is an all-time high. Link
Men who could do more than 40 push-ups had a 96% reduced risk of cardiovascular disease relative to men who could do less than 10, over a ten-year study. Link
Mars Rover Opportunityโs last words were, โMy battery is low and itโs getting dark.โ It was a little robot that was only supposed to work for 90 days, but it soldiered on for 15 years. And after not being able to raise her after many attempts, they sent her Billie Hollidayโs Iโll Be Seeing You. Itโs strange how I get emotional about such things, but Iโll miss her. I hope to be able to watch when we revive her once on the planet. Link
NASA and ESA are planning a mission to deflect an astroid. Link
💡 Ideas, Trends, & Analysis
The Rise of the Corporate Technology Ecosystem โ My new essay on how corporations will soon become our universal and subscription-basedโฆ
<code>Media</code><code>Unsupervised Learning is my weekly show where I spend 5-20 hours finding the most interesting stories in security, technology, and humans, which I then curate into a 30-minute podcast & companion newsletter.</code><code>The goal is to catch you up on current events, show you the best content from around the web, and hopefully give you something to think about as well.</code><code>Subscribe to the Newsletter or Podcast</code><code>🛡️ Security News
🔥 The OpenAI team created an algorithm that can write news stories so well that they are refusing to release it due to potential use to create fake news. I get what theyโre doing, but the odds of this not being co-developed by many other groups is close to zero over a span of months. Hereโs an example of a fake story it wrote about national security, and it did this on its second try with just a few words of seeding by a human. Link
People are concerned that Twitter may not be actually deleting DMs when you delete them. Someone pulled their data archive from Twitter and found their own deleted DMs. Itโs a good reminder that itโs a good policy to just consider anything you do online to be permanent. Link
Trend Micro and the Ponemon Institute created a Cyber Risk Index, which ranks from -10 to 10. Strangely, the lower the number the better, even though itโs called a Risk Index. And if you put that in a graph from left to right, the right side is better than the left side. I couldnโt even get into the way they built the numbers because Iโm forced to assume that process was as bad as the interface. The whole purpose of a system like this is to be used by others, so how could you possibly make such bad choices on the UI? Link
Someone found an open Chinese database online that was being used to track the location of millions of Uyghurs in the country. Between this, the re-education camp, the mass-surveillance and social credit system, the nation-wide censorship firewall, and their colonization of Africa, itโs obvious theyโre willing to do anything to win at this real-life game of Civiilization. Theโve become morally belligerent. Link
Drones will soon require visible license plates. Link
Switzerland is doing a bug bounty on their e-voting system. Link
The Pentagon is worried about China and Russia fielding ground-based lasers that can blind and otherwise disable U.S. satellites. Link
Advisories: Ubiquiti Device DDoS Potential, 75 Adobe Vulnerabilities, Android App Tracking, SAP HANA,
Leaks: 620 Million Records For Sale on Dark Web
⚙️ Technology News
If you refresh this website youโll get a human face, except theyโre not real humansโtheyโre AI generated. Importantly, itโs not a collection of pre-made images getting loaded. Theyโre all generated on the fly. Link
Chinese phones now make up a third of the European market, and Huawei has the top position. Link
One in six Americans wear a smartwatch. Link
👧🏼 Human News
Student debt thatโs 90 or more days delinquent is now at $166 billion dollarsโwhich is an all-time high. Link
Men who could do more than 40 push-ups had a 96% reduced risk of cardiovascular disease relative to men who could do less than 10, over a ten-year study. Link
Mars Rover Opportunityโs last words were, โMy battery is low and itโs getting dark.โ It was a little robot that was only supposed to work for 90 days, but it soldiered on for 15 years. And after not being able to raise her after many attempts, they sent her Billie Hollidayโs Iโll Be Seeing You. Itโs strange how I get emotional about such things, but Iโll miss her. I hope to be able to watch when we revive her once on the planet. Link
NASA and ESA are planning a mission to deflect an astroid. Link
💡 Ideas, Trends, & Analysis
The Rise of the Corporate Technology Ecosystem โ My new essay on how corporations will soon become our universal and subscription-basedโฆ
โ Sorry, we didnโt mean to keep that secret microphone a secret, says Google โ
๐ Read
via "Naked Security".
It's been off by default, Google says - not much consolation to those who don't cotton to the notion of a "secret" listening gadget.๐ Read
via "Naked Security".
Naked Security
Sorry, we didnโt mean to keep that secret microphone a secret, says Google
Itโs been off by default, Google says โ not much consolation to those who donโt cotton to the notion of a โsecretโ listening gadget.
โ Hacker Lauri Love denied bid to get computers back โ
๐ Read
via "Naked Security".
Hacker Lauri Love has failed to get his computers back six years after UKโs National Crime Agency took them as part of a criminal investigation.๐ Read
via "Naked Security".
Naked Security
Hacker Lauri Love denied bid to get computers back
Hacker Lauri Love has failed to get his computers back six years after UKโs National Crime Agency took them as part of a criminal investigation.
๐ 5 workplace technologies that cause the most employee data breaches ๐
๐ Read
via "Security on TechRepublic".
Some 83% of US security professionals said employees have accidently exposed sensitive customer information, according to an Egress survey.๐ Read
via "Security on TechRepublic".
TechRepublic
5 workplace technologies that cause the most employee data breaches
Some 83% of US security professionals said employees have accidently exposed sensitive customer information, according to an Egress survey.
โ 19-Year-Old WinRAR Flaw Plagues 500 Million Users โ
๐ Read
via "Threatpost | The first stop for security news".
Users of the popular file-compression tool are urged to immediately update after a serious code-execution flaw was found in WinRAR.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
19-Year-Old WinRAR Flaw Plagues 500 Million Users
Users of the popular file compression tool are urged to immediately update after a serious code execution flaw was found in WinRAR.
โ Password managers leaking data in memory, but you should still use one โ
๐ Read
via "Naked Security".
Several popular password managers appear to do a weak job at scrubbing passwords from memory once they are no longer being used.๐ Read
via "Naked Security".
Naked Security
Password managers leaking data in memory, but you should still use one
Several popular password managers appear to do a weak job at scrubbing passwords from memory once they are no longer being used.
๐ด Security Analysts Are Only Human ๐ด
๐ Read
via "Dark Reading: ".
SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.๐ Read
via "Dark Reading: ".
Darkreading
Security Analysts Are Only Human
SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.
โ Highly Critical Drupal RCE Flaw Affects Millions of Websites โ
๐ Read
via "Threatpost | The first stop for security news".
Admins should update immediately to fix a remote code-execution vulnerability.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Highly Critical Drupal RCE Flaw Affects Millions of Websites
Admins should update immediately to fix a remote code-execution vulnerability.
๐ How to regenerate certificates on VMware host servers ๐
๐ Read
via "Security on TechRepublic".
Regenerating certificates may securely resolve authentication traffic, which is not being properly encrypted.๐ Read
via "Security on TechRepublic".
TechRepublic
How to regenerate certificates on VMware host servers
Regenerating certificates may securely resolve authentication traffic, which is not being properly encrypted.
๐ How to set the AppArmor mode for a service in Ubuntu Server ๐
๐ Read
via "Security on TechRepublic".
If you work with a service outside of its standard behavior, you may need to change its AppArmor profile mode.๐ Read
via "Security on TechRepublic".
TechRepublic
How to set the AppArmor mode for a service in Ubuntu Server
If you work with a service outside of its standard behavior, you may need to change its AppArmor profile mode.