β Intel Windows 10 Graphics Drivers Riddled With Flaws β
π Read
via "Threatpost".
Intel has patched several high-severity vulnerabilities in its graphics drivers for Windows 10, which could lead to code code execution.π Read
via "Threatpost".
Threat Post
Intel Windows 10 Graphics Drivers Riddled With Flaws
Intel has patched several high-severity vulnerabilities in its graphics drivers for Windows 10, which could lead to code code execution.
π΄ 'SimBad': Android Adware Hits 210 Apps with 150M Downloads π΄
π Read
via "Dark Reading: ".
Google has removed infected applications from the Google Play store after a form of adware potentially affected millions of users.π Read
via "Dark Reading: ".
Dark Reading
'SimBad': Android Adware Hits 210 Apps with 150M Downloads
Google has removed infected applications from the Google Play store after a form of adware potentially affected millions of users.
π΄ IoT Anomaly Detection 101: Data Science to Predict the Unexpected π΄
π Read
via "Dark Reading: ".
Yes! You can predict the chance of a mechanical failure or security breach before it happens. Part one of a two-part series.π Read
via "Dark Reading: ".
Darkreading
IoT Anomaly Detection 101: Data Science to Predict the Unexpected
Yes! You can predict the chance of a mechanical failure or security breach before it happens. Part one of a two-part series.
π Lawmakers See California Consumer Privacy Act As Basis for Federal Law π
π Read
via "Subscriber Blog RSS Feed ".
In a Senate Judiciary hearing on Tuesday, lawmakers discussed the impact of California Consumer Privacy Act and how the law should set the stage for a federal privacy bill.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Lawmakers See California Consumer Privacy Act As Basis for Federal Law
In a Senate Judiciary hearing on Tuesday, lawmakers discussed the impact of California Consumer Privacy Act and how the law should set the stage for a federal privacy bill.
π΄ Enterprise Cloud Infrastructure a Big Target for Cryptomining Attacks π΄
π Read
via "Dark Reading: ".
Despite the declining values of cryptocurrencies, criminals continue to hammer away at container management platforms, cloud APIs, and control panels.π Read
via "Dark Reading: ".
Darkreading
Enterprise Cloud Infrastructure a Big Target for Cryptomining Attacks
Despite the declining values of cryptocurrencies, criminals continue to hammer away at container management platforms, cloud APIs, and control panels.
π΄ GPS Spoof Hits Geneva Motor Show π΄
π Read
via "Dark Reading: ".
Incident leaves GPS units showing a location in England and a date 17 years in the future.π Read
via "Dark Reading: ".
Dark Reading
GPS Spoof Hits Geneva Motor Show
Incident leaves GPS units showing a location in England and a date 17 years in the future.
β Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested β
π Read
via "Threatpost".
A Sydney man is accused of selling nearly 1 million compromised accounts, for a significant profit.π Read
via "Threatpost".
Threat Post
Purveyor of Cracked Netflix, Hulu, Spotify Accounts Arrested
A Sydney man is accused of selling nearly 1 million compromised accounts, for a significant profit.
π΄ Autism, Cybercrime, and Security's Skill Struggle π΄
π Read
via "Dark Reading: ".
People on the autism spectrum often possess traits that could help them succeed in cybersecurity - providing they don't fall into cybercrime first.π Read
via "Dark Reading: ".
Dark Reading
Autism, Cybercrime, and Security's Skill Struggle
People on the autism spectrum often possess traits that could help them succeed in cybersecurity - providing they don't fall into cybercrime first.
π΄ Three In Five Politicians' Websites Worldwide Don't Use HTTPS π΄
π Read
via "Dark Reading: ".
Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.π Read
via "Dark Reading: ".
Dark Reading
Three In Five Politicians' Websites Worldwide Don't Use HTTPS
Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.
π΄ Three In Five Politicians' Websites Worldwide Don't Use HTTPS π΄
π Read
via "Dark Reading: ".
Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.π Read
via "Dark Reading: ".
Dark Reading
Three In Five Politicians' Websites Don't Use HTTPS
Comparitech assessed the websites of more than 7,500 politicians in 37 countries and found 60.8% did not use valid SSL certificates.
ATENTIONβΌ New - CVE-2018-0389
π Read
via "National Vulnerability Database".
A vulnerability in the implementation of Session Initiation Protocol (SIP) processing in Cisco Small Business SPA514G IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending crafted SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. Cisco has not released software updates that address this vulnerability. This vulnerability affects Cisco Small Business SPA514G IP Phones that are running firmware release 7.6.2SR2 or earlier.π Read
via "National Vulnerability Database".
π΄ New Malware Shows Marketing Polish π΄
π Read
via "Dark Reading: ".
A new strain of point-of-sale malware skims credit card numbers and comes via a highly polished marketing campaign.π Read
via "Dark Reading: ".
Darkreading
New Malware Shows Marketing Polish
A new strain of point-of-sale malware skims credit card numbers and comes via a highly polished marketing campaign.
β Update now! Microsoftβs March 2019 Patch Tuesday is here β
π Read
via "Naked Security".
If you were among the millions of users who updated Chrome last week to dodge a zero-day exploit, Microsoft has something for you in this monthβs Patch Tuesday.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Google needs breaking up, says news chief β
π Read
via "Naked Security".
And Oracle accused Google of creating shadow profiles of even non-users. Theirs are just two of 85 responses to an Australian inquiry.π Read
via "Naked Security".
Naked Security
Google needs breaking up, says news chief
And Oracle accused Google of creating shadow profiles of even non-users. Theirs are just two of 85 responses to an Australian inquiry.
β Insider Threats Get Mean, Nasty and Very Personal β
π Read
via "Threatpost".
Increasingly, attackers are targeting the most vulnerable people inside companies and exploiting their weaknesses.π Read
via "Threatpost".
Threat Post
Insider Threats Get Mean, Nasty and Very Personal
Increasingly, attackers are targeting the most vulnerable people inside companies and exploiting their weaknesses.
π Businesses don't get how AI cybersecurity tools work, but plan to use them anyway π
π Read
via "Security on TechRepublic".
Some 71% of businesses plan to use AI and machine learning in their security tools this year, though over half aren't sure what that tech really does, according to Webroot.π Read
via "Security on TechRepublic".
TechRepublic
Businesses don't get how AI cybersecurity tools work, but plan to use them anyway
Some 71% of businesses plan to use AI and machine learning in their security tools this year, though over half aren't sure what that tech really does, according to Webroot.
π Cryptocurrency mining attacks still major security risk, despite closure of Coinhive π
π Read
via "Security on TechRepublic".
Cryptojacking attacks can be executed in more ways than JavaScript files in browsers, and cryptocurrency mining is moving to cloud services, according to AT&T Cybersecurity.π Read
via "Security on TechRepublic".
TechRepublic
Cryptocurrency mining attacks still major security risk, despite closure of Coinhive
Cryptojacking attacks can be executed in more ways than JavaScript files in browsers, and cryptocurrency mining is moving to cloud services, according to AT&T Cybersecurity.
β Man drives 3,300 miles to talk to YouTube about deleted video β
π Read
via "Naked Security".
It turns out that his wife deleted his "rambling", get-rich-quick video. The man was arrested for alleged threats.π Read
via "Naked Security".
Naked Security
Man drives 3,300 miles to talk to YouTube about deleted video
It turns out that his wife deleted his βramblingβ, get-rich-quick video. The man was arrested for alleged threats.
π΄ 4 Reasons to Take an 'Inside Out' View of Security π΄
π Read
via "Dark Reading: ".
When you approach security from the inside out, you're protecting your data by determining the most vital applications and using a risk-based strategy, which focuses on the most valuable and vulnerable assets.π Read
via "Dark Reading: ".
Darkreading
4 Reasons to Take an 'Inside Out' View of Security
When you approach security from the inside out, you're protecting your data by determining the most vital applications and using a risk-based strategy, which focuses on the most valuable and vulnerable assets.
β GlitchPOS Malware Peddled to Steal Credit Card Numbers β
π Read
via "Threatpost".
A new malware targeting point of sale systems, GlitchPOS, has been spotted on a crimeware forum.π Read
via "Threatpost".
Threat Post
GlitchPOS Malware Appears to Steal Credit-Card Numbers
A new malware targeting point of sale systems, GlitchPOS, has been spotted on a crimeware forum.
β Cisco Patches Critical βDefault Passwordβ Bug β
π Read
via "Threatpost".
Vulnerability allows adversaries to access monitoring system used for gathering info on operating systems and hardware.π Read
via "Threatpost".
Threat Post
Cisco Patches Critical βDefault Passwordβ Bug
Vulnerability allows adversaries to access monitoring system used to gathering info on operating systems and hardware.