β 19-Year-Old WinRAR Flaw Plagues 500 Million Users β
π Read
via "Threatpost | The first stop for security news".
Users of the popular file-compression tool are urged to immediately update after a serious code-execution flaw was found in WinRAR.π Read
via "Threatpost | The first stop for security news".
Threat Post
19-Year-Old WinRAR Flaw Plagues 500 Million Users
Users of the popular file compression tool are urged to immediately update after a serious code execution flaw was found in WinRAR.
β Password managers leaking data in memory, but you should still use one β
π Read
via "Naked Security".
Several popular password managers appear to do a weak job at scrubbing passwords from memory once they are no longer being used.π Read
via "Naked Security".
Naked Security
Password managers leaking data in memory, but you should still use one
Several popular password managers appear to do a weak job at scrubbing passwords from memory once they are no longer being used.
π΄ Security Analysts Are Only Human π΄
π Read
via "Dark Reading: ".
SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.π Read
via "Dark Reading: ".
Darkreading
Security Analysts Are Only Human
SOC security analysts shoulder the largest cybersecurity burden. Automation is the way to circumvent the unavoidable human factor. Third in a six-part series.
β Highly Critical Drupal RCE Flaw Affects Millions of Websites β
π Read
via "Threatpost | The first stop for security news".
Admins should update immediately to fix a remote code-execution vulnerability.π Read
via "Threatpost | The first stop for security news".
Threat Post
Highly Critical Drupal RCE Flaw Affects Millions of Websites
Admins should update immediately to fix a remote code-execution vulnerability.
π How to regenerate certificates on VMware host servers π
π Read
via "Security on TechRepublic".
Regenerating certificates may securely resolve authentication traffic, which is not being properly encrypted.π Read
via "Security on TechRepublic".
TechRepublic
How to regenerate certificates on VMware host servers
Regenerating certificates may securely resolve authentication traffic, which is not being properly encrypted.
π How to set the AppArmor mode for a service in Ubuntu Server π
π Read
via "Security on TechRepublic".
If you work with a service outside of its standard behavior, you may need to change its AppArmor profile mode.π Read
via "Security on TechRepublic".
TechRepublic
How to set the AppArmor mode for a service in Ubuntu Server
If you work with a service outside of its standard behavior, you may need to change its AppArmor profile mode.
β Adobe Re-Patches Critical Acrobat Reader Flaw β
π Read
via "Threatpost | The first stop for security news".
Adobe has issued yet another patch for a critical vulnerability in its Acrobat Reader - a week after the original fix.π Read
via "Threatpost | The first stop for security news".
Threat Post
Adobe Re-Patches Critical Acrobat Reader Flaw
Adobe has issued yet another patch for a critical vulnerability in its Acrobat Reader - a week after the original fix.
π΄ Cyber Extortionists Can Earn $360,000 a Year π΄
π Read
via "Dark Reading: ".
Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up.π Read
via "Dark Reading: ".
Dark Reading
Cyber Extortionists Can Earn $360,000 a Year
Extortion scams capitalize on compromised credentials, sensitive data, and technical vulnerabilities on Internet-facing applications to pressure victims to pay up.
π΄ New Free Tool Scans for Chrome Extension Safety π΄
π Read
via "Dark Reading: ".
CRXcavator scans extensions in real time based on factors including permissions, external calls, and third-party libraries.π Read
via "Dark Reading: ".
Dark Reading
New Free Tool Scans for Chrome Extension Safety
CRXcavator scans extensions in real time based on factors including permissions, external calls, and third-party libraries.
β ThreatList: Porn-Focused Malware Triples, Dark Web Loves It β
π Read
via "Threatpost | The first stop for security news".
Premium-access credentials to porn sites are hot in the cyber-underground, as credential-harvesting malware proliferates.π Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: Porn-Focused Malware Triples, Dark Web Loves It
Premium-access credentials to porn sites are hot in the cyber-underground, as credential-harvesting malware proliferates.
ATENTIONβΌ New - CVE-2013-5654 (yingzhipython)
π Read
via "National Vulnerability Database".
Vulnerability in YingZhi Python Programming Language v1.9 allows arbitrary anonymous uploads to the phone's storageπ Read
via "National Vulnerability Database".
π Cybersecurity Higher Education: The Top Cybersecurity Colleges and Degrees in 2019 π
π Read
via "Subscriber Blog RSS Feed ".
Top higher education institutions around the world are offering cybersecurity degrees and research programs for information security professionals looking to further their careers. The following are 82 of the top degree and research programs for cybersecurity studies.π Read
via "Subscriber Blog RSS Feed ".
π΄ Why Cybersecurity Burnout Is Real (and What to Do About It) π΄
π Read
via "Dark Reading: ".
The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.π Read
via "Dark Reading: ".
Darkreading
Why Cybersecurity Burnout Is Real (and What to Do About It)
The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.
π΄ Human Negligence to Blame for the Majority of Insider Threats π΄
π Read
via "Dark Reading: ".
In 98% of the assessments conducted for its research, Dtex found employees exposed proprietary company information on the Web - a 20% jump from 2018.π Read
via "Dark Reading: ".
Dark Reading
Human Negligence to Blame for the Majority of Insider Threats
In 98% of the assessments conducted for its research, Dtex found employees exposed proprietary company information on the Web - a 20% jump from 2018.
π΄ Attack Campaign Experiments with Rapid Changes in Email Lure Content π΄
π Read
via "Dark Reading: ".
It's like polymorphic behavior - only the changes are in the email lures themselves, with randomized changes to headers, subject lines, and body content.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ Researchers Propose New Approach to Address Online Password-Guessing Attacks π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Darkreading
Researchers Propose New Approach to Address Online Password-Guessing Attacks
Recommended best practices not effective against certain types of attacks, they say.
π΄ Researchers Propose New Approach to Address Online Password-Guessing Attacks π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Darkreading
Researchers Propose New Approach to Address Online Password-Guessing Attacks
Recommended best practices not effective against certain types of attacks, they say.
β Bluetooth βgas stationβ warning on Facebook β truth or hoax? [VIDEO] β
π Read
via "Naked Security".
Can your phone reliably detect card skimmers using Bluetooth alone? Find out in the latest Naked Security Live video...π Read
via "Naked Security".
Naked Security
Bluetooth βgas stationβ warning on Facebook β truth or hoax? [VIDEO]
Can your phone reliably detect card skimmers using Bluetooth alone? Find out in the latest Naked Security Live videoβ¦
β Facebook lets Android users block location tracking β
π Read
via "Naked Security".
Facebook announced it's tweaking its Android version, which was tracking your location even when the app wasn't in use.π Read
via "Naked Security".
Naked Security
Facebook lets Android users block location tracking
Facebook announced itβs tweaking its Android version, which was tracking your location even when the app wasnβt in use.
β Threatpost Poll: Are Password Managers Too Risky? β
π Read
via "Threatpost | The first stop for security news".
Weigh in on password managers with our Threatpost poll.π Read
via "Threatpost | The first stop for security news".
Threat Post
Threatpost Poll: Are Password Managers Too Risky?
Weigh in on password managers with our Threatpost poll.
β Flash βsecurity bypassβ list hidden in Microsoft Edge browser β
π Read
via "Naked Security".
Until this month, the Edge browser could bypass its own warnings about Flash content on 58 websites, thanks to a hidden list.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News