ATENTIONβΌ New - CVE-2013-7466
π Read
via "National Vulnerability Database".
Simple Machines Forum (SMF) 2.0.4 allows local file inclusion, with resultant remote code execution, in install.php via ../ directory traversal in the db_type parameter if install.php remains present after installation.π Read
via "National Vulnerability Database".
β For sale: Gray-market iPhones that yield secrets to encryption β
π Read
via "Naked Security".
The prototype iPhones are slipping out of Apple's supply chain with disabled security, to the delight of researchers and jailbreakers.π Read
via "Naked Security".
Naked Security
Developer-only iPhones help reveal Appleβs secret security sauce
The prototype iPhones are slipping out of Appleβs supply chain with disabled security, to the delight of researchers and jailbreakers.
β Windows Calculator is going open source β
π Read
via "Naked Security".
Can the combined power of the worldβs developers possibly improve the iconic Windows Calculator app? Microsoft seems to think so.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Zuck says Facebook is becoming more βprivacy focusedβ β
π Read
via "Naked Security".
Facebook's planning a new, highly integrated platform and talking a lot about encrypted messaging.π Read
via "Naked Security".
Naked Security
Zuck says Facebook is becoming more βprivacy focusedβ
Facebookβs planning a new, highly integrated platform and talking a lot about encrypted messaging.
π How to create a transformational cybersecurity strategy: 3 paths π
π Read
via "Security on TechRepublic".
Enterprises must build a security strategy that is aligned with business needs.π Read
via "Security on TechRepublic".
TechRepublic
How to create a transformational cybersecurity strategy: 3 paths
Enterprises must build a security strategy that is aligned with business needs.
β Firefox picks up advertiser-dodging tech from Tor β
π Read
via "Naked Security".
Letterboxing comes straight from the Tor browser, and will help Firefox users avoid advertisers that follow them around the web.π Read
via "Naked Security".
Naked Security
Firefox picks up advertiser-dodging tech from Tor
Letterboxing comes straight from the Tor browser, and will help Firefox users avoid advertisers that follow them around the web.
β RSA Conference 2019 Recap β
π Read
via "Threatpost".
From privacy to patches, Threatpost editors discuss the biggest infosec news and trends that they saw this week at RSA Conference 2019.π Read
via "Threatpost".
Threat Post
RSA Conference 2019 Recap
From privacy to patches, Threatpost editors discuss the biggest infosec news and trends that they saw this week at RSA Conference 2019.
π Why companies ignore cybersecurity in digital transformations π
π Read
via "Security on TechRepublic".
At RSA 2019, Emily Mossburg of Deloitte explained the challenges companies face when it comes to cybersecurity.π Read
via "Security on TechRepublic".
TechRepublic
Why companies ignore cybersecurity in digital transformations
At RSA 2019, Emily Mossburg of Deloitte explained the challenges companies face when it comes to cybersecurity.
π Why security is the top barrier in enterprise cloud adoption π
π Read
via "Security on TechRepublic".
At RSA 2019, Richard Bird of Ping Identity discussed identity-related security issues and solutions for enterprises.π Read
via "Security on TechRepublic".
TechRepublic
Why security is the top barrier in enterprise cloud adoption
At RSA 2019, Richard Bird of Ping Identity discussed identity-related security issues and solutions for enterprises.
β RSAC 2019: The Dark Side of Machine Learning β
π Read
via "Threatpost".
As smart devices permeate our lives, Google sends up a red flag and shows how the underlying systems can be attacked.π Read
via "Threatpost".
Threat Post
RSAC 2019: The Dark Side of Machine Learning
As smart devices permeate our lives, Google sends up a red flag and shows how the underlying systems can be attacked.
π Blockchain implementation: Top security risks for the enterprise π
π Read
via "Security on TechRepublic".
At RSA 2019, Charles Henderson of IBM X-Force Red explained the cybersecurity challenges involved in bringing blockchain to the enterprise.π Read
via "Security on TechRepublic".
TechRepublic
Blockchain implementation: Top security risks for the enterprise
At RSA 2019, Charles Henderson of IBM X-Force Red explained the cybersecurity challenges involved in bringing blockchain to the enterprise.
β Serious Security: When randomness isnβt β and why it matters β
π Read
via "Naked Security".
The password 'ji32k7au4a83' looks pretty random and feels as though it should be unique - read this article to find out why it's neither!π Read
via "Naked Security".
Naked Security
Serious Security: When randomness isnβt β and why it matters
The password βji32k7au4a83β looks pretty random and feels as though it should be unique β read this article to find out why itβs neither!
π The top cyberthreats enterprises must look out for in 2019 π
π Read
via "Security on TechRepublic".
At RSA 2019, Jason Escaravage from Booz Allen Hamilton explained why organizations need to have an incident response plan in place.π Read
via "Security on TechRepublic".
TechRepublic
The top cyberthreats enterprises must look out for in 2019
At RSA 2019, Jason Escaravage from Booz Allen Hamilton explained why organizations need to have an incident response plan in place.
π The top cyberthreats enterprises must look out for in 2019 π
π Read
via "Security on TechRepublic".
At RSA 2019, Jason Escaravage from Booz Allen Hamilton explained why organizations need to have an incident response plan in place.π Read
via "Security on TechRepublic".
TechRepublic
The top cyberthreats enterprises must look out for in 2019
At RSA 2019, Jason Escaravage from Booz Allen Hamilton explained why organizations need to have an incident response plan in place.
π Why CISOs are consolidating their vendors and improving cloud security π
π Read
via "Security on TechRepublic".
At RSA 2019, Jeff Reed of Cisco discussed the company's 2019 CISO Benchmark Study and the top threats enterprises face.π Read
via "Security on TechRepublic".
TechRepublic
Why CISOs are consolidating their vendors and improving cloud security
At RSA 2019, Jeff Reed of Cisco discussed the company's 2019 CISO Benchmark Study and the top threats enterprises face.
π Friday Five: 3/8 Edition π
π Read
via "Subscriber Blog RSS Feed ".
The NSA open sources a reverse engineering tool, Chinese hackers hit US universities, and a Chrome zero day - catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 3/8 Edition
The NSA open sources a reverse engineering tool, Chinese hackers hit US universities, and a Chrome zero day - catch up on the week's news with this roundup!
π Why CISOs are consolidating their vendors and improving cloud security π
π Read
via "Security on TechRepublic".
At RSA 2019, Jeff Reed of Cisco discussed the company's 2019 CISO Benchmark Study and the top threats enterprises face.π Read
via "Security on TechRepublic".
TechRepublic
Why CISOs are consolidating their vendors and improving cloud security
At RSA 2019, Jeff Reed of Cisco discussed the company's 2019 CISO Benchmark Study and the top threats enterprises face.
π How women can enter cybersecurity from other fields to close the talent gap π
π Read
via "Security on TechRepublic".
At RSA 2019, Emily Heath of United Airlines explained the gender and diversity gap in cybersecurity and offered advice for women and companies in how to close it.π Read
via "Security on TechRepublic".
TechRepublic
How women can enter cybersecurity from other fields to close the talent gap
At RSA 2019, Emily Heath of United Airlines explained the gender and diversity gap in cybersecurity and offered advice for women and companies in how to close it.
π How CISOs can gain a better understanding of their cybersecurity attack surface π
π Read
via "Security on TechRepublic".
At RSA 2019, Emily Heath of United Airlines explained the top security challenges businesses face.π Read
via "Security on TechRepublic".
TechRepublic
How CISOs can gain a better understanding of their cybersecurity attack surface
At RSA 2019, Emily Heath of United Airlines explained the top security challenges businesses face.
π΄ Ultrasound Machine Diagnosed with Major Security Gaps π΄
π Read
via "Dark Reading: ".
Check Point researchers investigate security risks and point to implications for medical IoT devices.π Read
via "Dark Reading: ".
Darkreading
Ultrasound Machine Diagnosed with Major Security Gaps
Check Point researchers investigate security risks and point to implications for medical IoT devices.
β RSA Conference 2019: Emotet Takes Aim at Latin America β
π Read
via "Threatpost".
RAT activity in Latin America and Asia ramped up at the end of 2018, indicating widespread coordinated targeting by threat actors.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: Emotet Takes Aim at Latin America
RAT activity in Latin America and Asia ramped up at the end of 2018, indicating widespread coordinated targeting by threat actors.