π How SMBs can bolster cybersecurity efforts π
π Read
via "Security on TechRepublic".
Learn what experts at a Wall Street Journal forum suggest businesses should do to improve their cybersecurity stance.π Read
via "Security on TechRepublic".
TechRepublic
How SMBs can bolster cybersecurity efforts
Learn what experts at a Wall Street Journal forum suggest businesses should do to improve their cybersecurity stance.
β John Oliver bombards the FCC with anti-robocall robocall campaign β
π Read
via "Naked Security".
The Last Week Tonight host launched an anti-robocalling robocalling campaign to force the FCC to put a stop to the pervasive, irritating calls.π Read
via "Naked Security".
Naked Security
John Oliver bombards the FCC with anti-robocall robocall campaign
The Last Week Tonight host launched an anti-robocalling robocalling campaign to force the FCC to put a stop to the pervasive, irritating calls.
β Email list-cleaning site may have leaked up to 2 billion records β
π Read
via "Naked Security".
The number of records exposed online by Verification.io email list-cleaning service may be far higher than originally anticipated.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Citrix admits attackers breached its network β what we know β
π Read
via "Naked Security".
On Friday, software giant Citrix issued a short statement admitting that hackers recently managed to get inside its internal network. According to a statement by chief information security officer Stan Black, the company was told of the attack by the FBI on 6 March, since when it had established that attackers had taken βbusiness documentsβ [β¦]π Read
via "Naked Security".
β Study throws security shade on freelance and student programmers β
π Read
via "Naked Security".
A recent study shows that if you aren't prepared to ask or pay for security, you probably won't get it.π Read
via "Naked Security".
Naked Security
Study throws security shade on freelance and student programmers
A recent study shows that if you arenβt prepared to ask or pay for security, you probably wonβt get it.
π Business PC users are most at risk in these 10 countries π
π Read
via "Security on TechRepublic".
Some 11% of US business computers are at risk of malware infection, compared to 20% of home PCs, according to an Avast report.π Read
via "Security on TechRepublic".
TechRepublic
Business PC users are most at risk in these 10 countries
Some 11% of US business computers are at risk of malware infection, compared to 20% of home PCs, according to an Avast report.
β Facebook sues developers over data-scraping quizzes β
π Read
via "Naked Security".
Downloaded by 63K users, the quizzes promised answers to questions such as "What kind of dog are you according to your zodiac sign?"π Read
via "Naked Security".
Naked Security
Facebook sues developers over data-scraping quizzes
Downloaded by 63K users, the quizzes promised answers to questions such as βWhat kind of dog are you according to your zodiac sign?β
π 25% of software vulnerabilities remain unpatched for more than a year π
π Read
via "Security on TechRepublic".
Smaller organizations are more agile at patching vulnerabilities, and vendor support goes a long way in easing patching, according to a report from Kenna Security and the Cyentia Institute.π Read
via "Security on TechRepublic".
TechRepublic
25% of software vulnerabilities remain unpatched for more than a year
Smaller organizations are more agile at patching vulnerabilities, and vendor support goes a long way in easing patching, according to a report from Kenna Security and the Cyentia Institute.
π΄ The 12 Worst Serverless Security Risks π΄
π Read
via "Dark Reading: ".
A new guide from the Cloud Security Alliance offers mitigations, best practices, and a comparison between traditional applications and their serverless counterparts.π Read
via "Dark Reading: ".
Darkreading
The 12 Worst Serverless Security Risks
A new guide from the Cloud Security Alliance offers mitigations, best practices, and a comparison between traditional applications and their serverless counterparts.
β Adobe Patches Critical Photoshop, Digital Edition Flaws β
π Read
via "Threatpost".
Adobe fixed two arbitrary code execution flaws in its Photoshop and Digital Edition products.π Read
via "Threatpost".
Threat Post
Adobe Patches Critical Photoshop, Digital Edition Flaws
Adobe fixed two arbitrary code execution flaws in its Photoshop and Digital Edition products.
β Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes β
π Read
via "Threatpost".
Microsoft won't be patching the bug, but a proof of concept shows the potential for successful malware implantation.π Read
via "Threatpost".
Threat Post
Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes
Microsoft won't be patching the bug, but a proof of concept shows the potential for successful malware implantation.
π΄ Cybercriminals Think Small to Earn Big π΄
π Read
via "Dark Reading: ".
As the number of breaches increased 424% in 2018, the average breach size shrunk 4.7 times as attackers aimed for smaller, more vulnerable targets.π Read
via "Dark Reading: ".
Darkreading
Cybercriminals Think Small to Earn Big
As the number of breaches increased 424% in 2018, the average breach size shrunk 4.7 times as attackers aimed for smaller, more vulnerable targets.
ATENTIONβΌ New - CVE-2018-17944
π Read
via "National Vulnerability Database".
On certain Lexmark devices that communicate with an LDAP or SMTP server, a malicious administrator can discover LDAP or SMTP credentials by changing that server's hostname to one that they control, and then capturing the credentials that are sent there. This occurs because stored credentials are not automatically deleted upon that type of hostname change.π Read
via "National Vulnerability Database".
π Misconfigured Box Accounts Yield Sensitive Data π
π Read
via "Subscriber Blog RSS Feed ".
Nearly 100 companies were exposing sensitive data, including raw CAD files and Social Security Numbers, on misconfigured Box accounts.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Misconfigured Box Accounts Yield Sensitive Data
Nearly 100 companies were exposing sensitive data, including raw CAD files and Social Security Numbers, on misconfigured Box accounts.
π΄ 5 Essentials for Securing and Managing Windows 10 π΄
π Read
via "Dark Reading: ".
It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.π Read
via "Dark Reading: ".
Dark Reading
5 Essentials for Securing and Managing Windows 10
It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.
π΄ It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job π΄
π Read
via "Dark Reading: ".
Meanwhile, organizations are looking at nonconventional ways to staff up and train their workforce as technical expertise gets even harder to find.π Read
via "Dark Reading: ".
Dark Reading
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Meanwhile, organizations are looking at nonconventional ways to staff up and train their workforce as technical expertise gets even harder to find.
π΄ Box Mistakes Leave Enterprise Data Exposed π΄
π Read
via "Dark Reading: ".
User errors in enterprise Box accounts have left hundreds of thousands of sensitive documents exposed to thieves and peeping toms.π Read
via "Dark Reading: ".
Dark Reading
Box Mistakes Leave Enterprise Data Exposed
User errors in enterprise Box accounts have left hundreds of thousands of sensitive documents exposed to thieves and peeping toms.
β ThreatList: Phishing Attacks Doubled in 2018 β
π Read
via "Threatpost".
Scammers used both older, tested-and-true phishing tactics in 2018 - but also newer tricks, such as fresh distribution methods, according to a new report.π Read
via "Threatpost".
Threat Post
ThreatList: Phishing Attacks Doubled in 2018
Scammers used both older, tested-and-true phishing tactics in 2018 - but also newer tricks, such as fresh distribution methods, according to a new report.
β Microsoft Patches Two Win32k Bugs Under Active Attack β
π Read
via "Threatpost".
Microsoft's March Patch Tuesday updates include 64 fixes, 17 of which are rated critical.π Read
via "Threatpost".
Threat Post
Microsoft Patches Two Win32k Bugs Under Active Attack
March Patch Tuesday updates include 64 CVEs, 17 of which are rated critical.
π΄ How the Best DevSecOps Teams Make Risk Visible to Developers π΄
π Read
via "Dark Reading: ".
DevOps-minded CISOs say enterprise security teams need to do a better job scoring and visualizing risk for developers and business executives.π Read
via "Dark Reading: ".
Dark Reading
How the Best DevSecOps Teams Make Risk Visible to Developers
DevOps-minded CISOs say enterprise security teams need to do a better job scoring and visualizing risk for developers and business executives.
β Federal Focus on Cyber Plays Out in Presidentβs Budget, IoT Legislation β
π Read
via "Threatpost".
Money earmarked for the Defense Department and DHS, and bipartisan bills to address the security of federal IoT devices, showcase growing federal cyber-efforts.π Read
via "Threatpost".
Threat Post
Federal Focus on Cyber Plays Out in Presidentβs Budget, IoT Legislation
Money earmarked for the Defense Department and DHS, and bipartisan bills to address the security of federal IoT devices, showcase growing federal cyber-efforts.