β Study throws security shade on freelance and student programmers β
π Read
via "Naked Security".
A recent study shows that if you aren't prepared to ask or pay for security, you probably won't get it.π Read
via "Naked Security".
Naked Security
Study throws security shade on freelance and student programmers
A recent study shows that if you arenβt prepared to ask or pay for security, you probably wonβt get it.
π Business PC users are most at risk in these 10 countries π
π Read
via "Security on TechRepublic".
Some 11% of US business computers are at risk of malware infection, compared to 20% of home PCs, according to an Avast report.π Read
via "Security on TechRepublic".
TechRepublic
Business PC users are most at risk in these 10 countries
Some 11% of US business computers are at risk of malware infection, compared to 20% of home PCs, according to an Avast report.
β Facebook sues developers over data-scraping quizzes β
π Read
via "Naked Security".
Downloaded by 63K users, the quizzes promised answers to questions such as "What kind of dog are you according to your zodiac sign?"π Read
via "Naked Security".
Naked Security
Facebook sues developers over data-scraping quizzes
Downloaded by 63K users, the quizzes promised answers to questions such as βWhat kind of dog are you according to your zodiac sign?β
π 25% of software vulnerabilities remain unpatched for more than a year π
π Read
via "Security on TechRepublic".
Smaller organizations are more agile at patching vulnerabilities, and vendor support goes a long way in easing patching, according to a report from Kenna Security and the Cyentia Institute.π Read
via "Security on TechRepublic".
TechRepublic
25% of software vulnerabilities remain unpatched for more than a year
Smaller organizations are more agile at patching vulnerabilities, and vendor support goes a long way in easing patching, according to a report from Kenna Security and the Cyentia Institute.
π΄ The 12 Worst Serverless Security Risks π΄
π Read
via "Dark Reading: ".
A new guide from the Cloud Security Alliance offers mitigations, best practices, and a comparison between traditional applications and their serverless counterparts.π Read
via "Dark Reading: ".
Darkreading
The 12 Worst Serverless Security Risks
A new guide from the Cloud Security Alliance offers mitigations, best practices, and a comparison between traditional applications and their serverless counterparts.
β Adobe Patches Critical Photoshop, Digital Edition Flaws β
π Read
via "Threatpost".
Adobe fixed two arbitrary code execution flaws in its Photoshop and Digital Edition products.π Read
via "Threatpost".
Threat Post
Adobe Patches Critical Photoshop, Digital Edition Flaws
Adobe fixed two arbitrary code execution flaws in its Photoshop and Digital Edition products.
β Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes β
π Read
via "Threatpost".
Microsoft won't be patching the bug, but a proof of concept shows the potential for successful malware implantation.π Read
via "Threatpost".
Threat Post
Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes
Microsoft won't be patching the bug, but a proof of concept shows the potential for successful malware implantation.
π΄ Cybercriminals Think Small to Earn Big π΄
π Read
via "Dark Reading: ".
As the number of breaches increased 424% in 2018, the average breach size shrunk 4.7 times as attackers aimed for smaller, more vulnerable targets.π Read
via "Dark Reading: ".
Darkreading
Cybercriminals Think Small to Earn Big
As the number of breaches increased 424% in 2018, the average breach size shrunk 4.7 times as attackers aimed for smaller, more vulnerable targets.
ATENTIONβΌ New - CVE-2018-17944
π Read
via "National Vulnerability Database".
On certain Lexmark devices that communicate with an LDAP or SMTP server, a malicious administrator can discover LDAP or SMTP credentials by changing that server's hostname to one that they control, and then capturing the credentials that are sent there. This occurs because stored credentials are not automatically deleted upon that type of hostname change.π Read
via "National Vulnerability Database".
π Misconfigured Box Accounts Yield Sensitive Data π
π Read
via "Subscriber Blog RSS Feed ".
Nearly 100 companies were exposing sensitive data, including raw CAD files and Social Security Numbers, on misconfigured Box accounts.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Misconfigured Box Accounts Yield Sensitive Data
Nearly 100 companies were exposing sensitive data, including raw CAD files and Social Security Numbers, on misconfigured Box accounts.
π΄ 5 Essentials for Securing and Managing Windows 10 π΄
π Read
via "Dark Reading: ".
It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.π Read
via "Dark Reading: ".
Dark Reading
5 Essentials for Securing and Managing Windows 10
It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.
π΄ It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job π΄
π Read
via "Dark Reading: ".
Meanwhile, organizations are looking at nonconventional ways to staff up and train their workforce as technical expertise gets even harder to find.π Read
via "Dark Reading: ".
Dark Reading
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Meanwhile, organizations are looking at nonconventional ways to staff up and train their workforce as technical expertise gets even harder to find.
π΄ Box Mistakes Leave Enterprise Data Exposed π΄
π Read
via "Dark Reading: ".
User errors in enterprise Box accounts have left hundreds of thousands of sensitive documents exposed to thieves and peeping toms.π Read
via "Dark Reading: ".
Dark Reading
Box Mistakes Leave Enterprise Data Exposed
User errors in enterprise Box accounts have left hundreds of thousands of sensitive documents exposed to thieves and peeping toms.
β ThreatList: Phishing Attacks Doubled in 2018 β
π Read
via "Threatpost".
Scammers used both older, tested-and-true phishing tactics in 2018 - but also newer tricks, such as fresh distribution methods, according to a new report.π Read
via "Threatpost".
Threat Post
ThreatList: Phishing Attacks Doubled in 2018
Scammers used both older, tested-and-true phishing tactics in 2018 - but also newer tricks, such as fresh distribution methods, according to a new report.
β Microsoft Patches Two Win32k Bugs Under Active Attack β
π Read
via "Threatpost".
Microsoft's March Patch Tuesday updates include 64 fixes, 17 of which are rated critical.π Read
via "Threatpost".
Threat Post
Microsoft Patches Two Win32k Bugs Under Active Attack
March Patch Tuesday updates include 64 CVEs, 17 of which are rated critical.
π΄ How the Best DevSecOps Teams Make Risk Visible to Developers π΄
π Read
via "Dark Reading: ".
DevOps-minded CISOs say enterprise security teams need to do a better job scoring and visualizing risk for developers and business executives.π Read
via "Dark Reading: ".
Dark Reading
How the Best DevSecOps Teams Make Risk Visible to Developers
DevOps-minded CISOs say enterprise security teams need to do a better job scoring and visualizing risk for developers and business executives.
β Federal Focus on Cyber Plays Out in Presidentβs Budget, IoT Legislation β
π Read
via "Threatpost".
Money earmarked for the Defense Department and DHS, and bipartisan bills to address the security of federal IoT devices, showcase growing federal cyber-efforts.π Read
via "Threatpost".
Threat Post
Federal Focus on Cyber Plays Out in Presidentβs Budget, IoT Legislation
Money earmarked for the Defense Department and DHS, and bipartisan bills to address the security of federal IoT devices, showcase growing federal cyber-efforts.
π΄ Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack π΄
π Read
via "Dark Reading: ".
Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Citrix Breach Underscores Password Perils π΄
π Read
via "Dark Reading: ".
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.π Read
via "Dark Reading: ".
Darkreading
Citrix Breach Underscores Password Perils
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.
π΄ Web Apps are Becoming Less Secure π΄
π Read
via "Dark Reading: ".
Critical vulnerabilities in web applications tripled in 2018, according to a new study.π Read
via "Dark Reading: ".
Dark Reading
Web Apps Are Becoming Less Secure
Critical vulnerabilities in web applications tripled in 2018, according to a new study.
π΄ There May be A Ceiling on Vulnerability Remediation π΄
π Read
via "Dark Reading: ".
Most organizations are doing all they can to keep up with the release of vulnerabilities, new research shows.π Read
via "Dark Reading: ".
Dark Reading
There May be A Ceiling on Vulnerability Remediation
Most organizations are doing all they can to keep up with the release of vulnerabilities, new research shows.