⚠ Chrome will soon block drive-by-download malvertising ⚠
📖 Read
via "Naked Security".
A new Chrome feature hopes to choke off one of the most malicious forms of malware infection: drive-by advertising downloads.📖 Read
via "Naked Security".
Naked Security
Chrome will soon block drive-by-download malvertising
A new Chrome feature hopes to choke off one of the most malicious forms of malware infection: drive-by advertising downloads.
🔐 How to wipe your USB drive before throwing it away 🔐
📖 Read
via "Security on TechRepublic".
Data was found on 68% of secondhand flash drives sold in the US, according to a Comparitech report. Here's how to secure your data for disposal.📖 Read
via "Security on TechRepublic".
TechRepublic
How to wipe your USB drive before throwing it away
Data was found on 68% of secondhand flash drives sold in the US, according to a Comparitech report. Here's how to secure your data for disposal.
❌ Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw ❌
📖 Read
via "Threatpost".
Newly patched CVE-2019-0797 is being actively exploited by two APTs, FruityArmor and SandCat.📖 Read
via "Threatpost".
Threat Post
Threat Groups SandCat, FruityArmor Exploiting Microsoft Win32k Flaw
Newly patched CVE-2019-0797 is being actively exploited by two APTs, FruityArmor and SandCat.
🕴 The Case for Transparency in End-User License Agreements 🕴
📖 Read
via "Dark Reading: ".
Why it behooves technology companies to consider EULAs as an opportunity to accurately inform customers about privacy issues and other important information.📖 Read
via "Dark Reading: ".
Dark Reading
The Case for Transparency in End-User License Agreements
Why it behooves technology companies to consider EULAs as an opportunity to accurately inform customers about privacy issues and other important information.
❌ Three Ways DNS is Weaponized and How to Mitigate the Risk ❌
📖 Read
via "Threatpost".
Why are hackers using the DNS infrastructure against us? The answer is more complex than you might think.📖 Read
via "Threatpost".
Threat Post
Three Ways DNS is Weaponized and How to Mitigate the Risk
Why are hackers using the DNS infrastructure against us? The answer is more complex than you might think.
🔐 How to generate SSH keys on macOS Mojave 🔐
📖 Read
via "Security on TechRepublic".
macOS is capable of working with SSH keys. Jack Wallen shows you how to generate the necessary keys and copy them to a server.📖 Read
via "Security on TechRepublic".
TechRepublic
How to generate SSH keys on macOS Mojave | TechRepublic
macOS is perfectly capable of working with SSH keys, for more secure remote connections. Jack Wallen shows you how to generate the necessary keys and copy them to a server.
❌ MAGA ‘Safe Space’ App Developer Threatens Security Researcher ❌
📖 Read
via "Threatpost".
The mobile app, dubbed a "Yelp for Conservatives," was found with an open API leaking reams of user data.📖 Read
via "Threatpost".
Threat Post
MAGA ‘Safe Space’ App Developer Threatens Security Researcher
The mobile app, dubbed a "Yelp for Conservatives," was found with an open API leaking reams of user data.
ATENTION‼ New - CVE-2018-17937
📖 Read
via "National Vulnerability Database".
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2015-2254
📖 Read
via "National Vulnerability Database".
Huawei OceanStor UDS devices with software before V100R002C01SPC102 might allow remote attackers to capture and change patch loading information resulting in the deletion of directory files and compromise of system functions when loading a patch.📖 Read
via "National Vulnerability Database".
❌ Intel Windows 10 Graphics Drivers Riddled With Flaws ❌
📖 Read
via "Threatpost".
Intel has patched several high-severity vulnerabilities in its graphics drivers for Windows 10, which could lead to code code execution.📖 Read
via "Threatpost".
Threat Post
Intel Windows 10 Graphics Drivers Riddled With Flaws
Intel has patched several high-severity vulnerabilities in its graphics drivers for Windows 10, which could lead to code code execution.
🕴 'SimBad': Android Adware Hits 210 Apps with 150M Downloads 🕴
📖 Read
via "Dark Reading: ".
Google has removed infected applications from the Google Play store after a form of adware potentially affected millions of users.📖 Read
via "Dark Reading: ".
Dark Reading
'SimBad': Android Adware Hits 210 Apps with 150M Downloads
Google has removed infected applications from the Google Play store after a form of adware potentially affected millions of users.
🕴 IoT Anomaly Detection 101: Data Science to Predict the Unexpected 🕴
📖 Read
via "Dark Reading: ".
Yes! You can predict the chance of a mechanical failure or security breach before it happens. Part one of a two-part series.📖 Read
via "Dark Reading: ".
Darkreading
IoT Anomaly Detection 101: Data Science to Predict the Unexpected
Yes! You can predict the chance of a mechanical failure or security breach before it happens. Part one of a two-part series.
🔏 Lawmakers See California Consumer Privacy Act As Basis for Federal Law 🔏
📖 Read
via "Subscriber Blog RSS Feed ".
In a Senate Judiciary hearing on Tuesday, lawmakers discussed the impact of California Consumer Privacy Act and how the law should set the stage for a federal privacy bill.📖 Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Lawmakers See California Consumer Privacy Act As Basis for Federal Law
In a Senate Judiciary hearing on Tuesday, lawmakers discussed the impact of California Consumer Privacy Act and how the law should set the stage for a federal privacy bill.
🕴 Enterprise Cloud Infrastructure a Big Target for Cryptomining Attacks 🕴
📖 Read
via "Dark Reading: ".
Despite the declining values of cryptocurrencies, criminals continue to hammer away at container management platforms, cloud APIs, and control panels.📖 Read
via "Dark Reading: ".
Darkreading
Enterprise Cloud Infrastructure a Big Target for Cryptomining Attacks
Despite the declining values of cryptocurrencies, criminals continue to hammer away at container management platforms, cloud APIs, and control panels.
🕴 GPS Spoof Hits Geneva Motor Show 🕴
📖 Read
via "Dark Reading: ".
Incident leaves GPS units showing a location in England and a date 17 years in the future.📖 Read
via "Dark Reading: ".
Dark Reading
GPS Spoof Hits Geneva Motor Show
Incident leaves GPS units showing a location in England and a date 17 years in the future.
❌ Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested ❌
📖 Read
via "Threatpost".
A Sydney man is accused of selling nearly 1 million compromised accounts, for a significant profit.📖 Read
via "Threatpost".
Threat Post
Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested
A Sydney man is accused of selling nearly 1 million compromised accounts, for a significant profit.
🕴 Autism, Cybercrime, and Security's Skill Struggle 🕴
📖 Read
via "Dark Reading: ".
People on the autism spectrum often possess traits that could help them succeed in cybersecurity - providing they don't fall into cybercrime first.📖 Read
via "Dark Reading: ".
Dark Reading
Autism, Cybercrime, and Security's Skill Struggle
People on the autism spectrum often possess traits that could help them succeed in cybersecurity - providing they don't fall into cybercrime first.
🕴 Three In Five Politicians' Websites Worldwide Don't Use HTTPS 🕴
📖 Read
via "Dark Reading: ".
Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.📖 Read
via "Dark Reading: ".
Dark Reading
Three In Five Politicians' Websites Worldwide Don't Use HTTPS
Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.
🕴 Three In Five Politicians' Websites Worldwide Don't Use HTTPS 🕴
📖 Read
via "Dark Reading: ".
Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.📖 Read
via "Dark Reading: ".
Dark Reading
Three In Five Politicians' Websites Don't Use HTTPS
Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.
ATENTION‼ New - CVE-2018-0389
📖 Read
via "National Vulnerability Database".
A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. Cisco has not released software updates that address this vulnerability. This vulnerability affects Cisco Small Business SPA514G IP Phones that are running firmware release 7.6.2SR2 or earlier.📖 Read
via "National Vulnerability Database".
🕴 New Malware Shows Marketing Polish 🕴
📖 Read
via "Dark Reading: ".
A new strain of point-of-sale malware skims credit card numbers and comes via a highly polished marketing campaign.📖 Read
via "Dark Reading: ".
Darkreading
New Malware Shows Marketing Polish
A new strain of point-of-sale malware skims credit card numbers and comes via a highly polished marketing campaign.