π PHI of 45,000 Exposed Following Third Party Data Misuse π
π Read
via "Subscriber Blog RSS Feed ".
The incident stems from an employee at a vendor working with the medical center improperly disclosing patient data.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
PHI of 45,000 Exposed Following Third Party Data Misuse
The incident stems from an employee at a vendor working with the medical center improperly disclosing patient data.
β RSA Conference 2019: How to Be Better, on Trust, AI and IoT β
π Read
via "Threatpost".
Tuesday's keynotes kicking off RSA tackled both light and dark visions of the future, the imperative to become obsessed with trust, IoT and AI, and they even featured Helen Mirren and a flash mob.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: How to Be Better, on Trust, AI and IoT
Tuesday's keynotes kicking off RSA tackled both light and dark visions of the future, the imperative to become obsessed with trust, IoT and AI, and they even featured Helen Mirren and a flash mob.
π΄ Cybercriminals Target Young Gamers π΄
π Read
via "Dark Reading: ".
Deceptive and inappropriate tactics are prevalent in free gaming apps, according to a new report to be released at the RSA Conference.π Read
via "Dark Reading: ".
Darkreading
Cybercriminals Target Young Gamers
Deceptive and inappropriate tactics are prevalent in free gaming apps, according to a new report to be released at the RSA Conference.
β Facebook criticised for misuse of phone numbers provided for security β
π Read
via "Naked Security".
Facebook admits it's using numbers supplied for 2FA for more than security, and you can't turn it off.π Read
via "Naked Security".
Naked Security
Facebook criticised for misuse of phone numbers provided for security
Facebook admits itβs using numbers supplied for 2FA for more than security, and you canβt turn it off.
π΄ Trust, or Lack of It, Is a Key Theme on RSAC Keynote Stage π΄
π Read
via "Dark Reading: ".
Neither machines nor humans might be entirely trustworthy, but the cooperation of the two might be the answer to issues of misinformation, deep fake videos, and other issues of trust, say security leaders.π Read
via "Dark Reading: ".
Dark Reading
Trust, or Lack of It, Is a Key Theme on RSAC Keynote Stage
Neither machines nor humans might be entirely trustworthy, but the cooperation of the two might be the answer to issues of misinformation, deep fake videos, and other issues of trust, say security leaders.
ATENTIONβΌ New - CVE-2018-11793
π Read
via "National Vulnerability Database".
When parsing a JSON payload with deeply nested JSON structures, the parser in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.1, 1.6.0 to 1.6.1, and 1.7.0 might overflow the stack due to unbounded recursion. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable.π Read
via "National Vulnerability Database".
π΄ Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses π΄
π Read
via "Dark Reading: ".
Problem lies in the manner in which Word handles integer overflow errors in OLE file format, Mimecast says.π Read
via "Dark Reading: ".
Darkreading
Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses
Problem lies in the manner in which Word handles integer overflow errors in OLE file format, Mimecast says.
π΄ Consumers Care About Privacy, but Not Enough to Act on It π΄
π Read
via "Dark Reading: ".
People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.π Read
via "Dark Reading: ".
Dark Reading
Consumers Care About Privacy, but Not Enough to Act on It
People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.
β Ep. 022 β Plaintext passwords, cryptocoin criminality and the Momo monstrosity [PODCAST] β
π Read
via "Naked Security".
Here's the latest episode of the Naked Security podcast - listen now!π Read
via "Naked Security".
Naked Security
Ep. 022 β Plaintext passwords, cryptocoin criminality and the Momo monstrosity [PODCAST]
Hereβs the latest episode of the Naked Security podcast β listen now!
β RSAC 2019: TLS Markets Flourish on the Dark Web β
π Read
via "Threatpost".
The certificates are often paired with ancillary products, like Google-indexed βagedβ domains, after-sale support, web design services and even integration with a range of payment processors.π Read
via "Threatpost".
Threat Post
RSAC 2019: TLS Markets Flourish on the Dark Web
The certificates are often paired with ancillary products, like Google-indexed βagedβ domains, after-sale support, web design services and even integration with a range of payment processors.
β Google Photos disables sharing on Android TV β
π Read
via "Naked Security".
Two models of Android TVs showed a stream of strangers' Google accounts, along with profile pics, though not the actual photos.π Read
via "Naked Security".
Naked Security
Google Photos disables sharing on Android TV
Two models of Android TVs showed a stream of strangersβ Google accounts, along with profile pics, though not the actual photos.
β RSA Conference 2019: Microsoft, Google, Twitter on Federal Privacy Regs β
π Read
via "Threatpost".
Public policy honchos for the tech giants discussed what they would like to see in sweeping GDPR-like federal data privacy legislation.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: Microsoft, Google, Twitter on Federal Privacy Regs
Public policy honchos for the tech giants discussed what they would like to see in sweeping GDPR-like federal data privacy legislation.
β Leaky ski helmet speakers expose conversations and data β
π Read
via "Naked Security".
Chips 2.0 speakers are the perfect accessory for any on-trend skier. Thereβs just one problem: Everyone else can listen in too.π Read
via "Naked Security".
Naked Security
Leaky ski helmet speakers expose conversations and data
Chips 2.0 speakers are the perfect accessory for any on-trend skier. Thereβs just one problem: Everyone else can listen in too.
π 3 things you need in a cybersecurity awareness training plan π
π Read
via "Security on TechRepublic".
Organizations can change employee security behaviors by creating a strategic plan, according to SANS Security Awareness.π Read
via "Security on TechRepublic".
TechRepublic
3 things you need in a cybersecurity awareness training plan
Organizations can change employee security behaviors by creating a strategic plan, according to SANS Security Awareness.
π 10 enterprise network mistakes that open the door to hackers π
π Read
via "Security on TechRepublic".
At RSA 2019, Paula Januszkiewicz of CQURE explained common infrastructure shortcuts that open the door to hacking.π Read
via "Security on TechRepublic".
TechRepublic
10 enterprise network mistakes that open the door to hackers
At RSA 2019, Paula Januszkiewicz of CQURE explained common infrastructure shortcuts that open the door to hacking.
β Google reveals BuggyCow macOS security flaw β
π Read
via "Naked Security".
Googleβs Project Zero researchers have revealed a "high severity" macOS security flaw nicknamed βBuggyCowβ which Apple appears to be in no rush to patch.π Read
via "Naked Security".
Naked Security
Google reveals BuggyCow macOS security flaw
Googleβs Project Zero researchers have revealed a βhigh severityβ macOS security flaw nicknamed βBuggyCowβ which Apple appears to be in no rush to patch.
β RSA Conference: Data-Wiping Cyberattacks Plague Financial Firms β
π Read
via "Threatpost".
A new report outlines the cyberattacks and threats that financial firms are facing.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: Data-Wiping Cyberattacks Plague Financial Firms
A new report outlines the cyberattacks and threats that financial firms are facing.
β RSA Conference 2019: Cryptographersβ Panel Decries Adi Shamirβs Visa Issues β
π Read
via "Threatpost".
Panelists react to missing noted cryptographer Adi Shamir who was denied a visa to enter the US to attend the RSAC.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: Cryptographersβ Panel Decries Adi Shamirβs Visa Issues
Panelists react to missing noted cryptographer Adi Shamir who was denied a visa to enter the US to attend the RSAC.
π΄ Fighting Alert Fatigue with Actionable Intelligence π΄
π Read
via "Dark Reading: ".
By fine-tuning security system algorithms, analysts can make alerts intelligent and useful, not merely generators of noise.π Read
via "Dark Reading: ".
Darkreading
Fighting Alert Fatigue with Actionable Intelligence
By fine-tuning security system algorithms, analysts can make alerts intelligent and useful, not merely generators of noise.
β Serious Chrome zero-day β Google says update βright this minuteβ β
π Read
via "Naked Security".
When a security expert on the Chrome team says, "update your Chrome installs... like right this minute" - well, here's how to check!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ It's Time to Rethink Your Vendor Questionnaire π΄
π Read
via "Dark Reading: ".
To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin.π Read
via "Dark Reading: ".
Dark Reading
It's Time to Rethink Your Vendor Questionnaire
To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin.