β Man drives 3,300 miles to talk to YouTube about deleted video β
π Read
via "Naked Security".
It turns out that his wife deleted his "rambling", get-rich-quick video. The man was arrested for alleged threats.π Read
via "Naked Security".
Naked Security
Man drives 3,300 miles to talk to YouTube about deleted video
It turns out that his wife deleted his βramblingβ, get-rich-quick video. The man was arrested for alleged threats.
π΄ 4 Reasons to Take an 'Inside Out' View of Security π΄
π Read
via "Dark Reading: ".
When you approach security from the inside out, you're protecting your data by determining the most vital applications and using a risk-based strategy, which focuses on the most valuable and vulnerable assets.π Read
via "Dark Reading: ".
Darkreading
4 Reasons to Take an 'Inside Out' View of Security
When you approach security from the inside out, you're protecting your data by determining the most vital applications and using a risk-based strategy, which focuses on the most valuable and vulnerable assets.
β GlitchPOS Malware Peddled to Steal Credit Card Numbers β
π Read
via "Threatpost".
A new malware targeting point of sale systems, GlitchPOS, has been spotted on a crimeware forum.π Read
via "Threatpost".
Threat Post
GlitchPOS Malware Appears to Steal Credit-Card Numbers
A new malware targeting point of sale systems, GlitchPOS, has been spotted on a crimeware forum.
β Cisco Patches Critical βDefault Passwordβ Bug β
π Read
via "Threatpost".
Vulnerability allows adversaries to access monitoring system used for gathering info on operating systems and hardware.π Read
via "Threatpost".
Threat Post
Cisco Patches Critical βDefault Passwordβ Bug
Vulnerability allows adversaries to access monitoring system used to gathering info on operating systems and hardware.
π΄ Businesses Increase Investments in AI and Machine Learning π΄
π Read
via "Dark Reading: ".
More than three-quarters of IT pros say they feel safer for having done so, according to a new report.π Read
via "Dark Reading: ".
Dark Reading
Businesses Increase Investments in AI and Machine Learning
More than three-quarters of IT pros say they feel safer for having done so, according to a new report.
π Businesses don't get how AI cybersecurity tools work, but plan to use them anyway π
π Read
via "Security on TechRepublic".
Some 71% of businesses plan to use AI and machine learning in their security tools this year, though over half aren't sure what that tech really does, according to Webroot.π Read
via "Security on TechRepublic".
TechRepublic
Businesses don't get how AI cybersecurity tools work, but plan to use them anyway
Some 71% of businesses plan to use AI and machine learning in their security tools this year, though over half aren't sure what that tech really does, according to Webroot.
β Serious Security: What we can all learn from #PiDay β
π Read
via "Naked Security".
Pi Day isn't just about circles or special numbers - there are some cybersecurity lessons in there, too, and here they are...π Read
via "Naked Security".
Naked Security
Serious Security: What we can all learn from #PiDay
Pi Day isnβt just about circles or special numbers β there are some cybersecurity lessons in there, too, and here they areβ¦
π΄ Join Your Peers at the Black Hat Asia Executive Summit π΄
π Read
via "Dark Reading: ".
There's still time to apply for Black Hat's focused high-level networking and knowledge-sharing event in Singapore next week!π Read
via "Dark Reading: ".
Dark Reading
Join Your Peers at the Black Hat Asia Executive Summit
There's still time to apply for Black Hat's focused high-level networking and knowledge-sharing event in Singapore next week!
π΄ US Prosecutors Investigate Facebook's Data-Sharing Deals π΄
π Read
via "Dark Reading: ".
The news follows a long, tumultuous period of scandal around Facebook and its privacy practices.π Read
via "Dark Reading: ".
Dark Reading
US Prosecutors Investigate Facebook's Data-Sharing Deals
The news follows a long, tumultuous period of scandal around Facebook and its privacy practices.
π FTC Considering Making Changes to GLB Actβs Safeguards, Privacy Rule π
π Read
via "Subscriber Blog RSS Feed ".
New amendments to the rules, proposed last week and largely based on the New York State Department of Financial Servicesβ Cybersecurity Regulation, would better protect customer information held by financial institutions.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
FTC Considering Making Changes to GLB Actβs Safeguards, Privacy Rule
New amendments to the rules, proposed last week and largely based on the New York State Department of Financial Servicesβ Cybersecurity Regulation, would better protect customer information held by financial institutions.
ATENTIONβΌ New - CVE-2018-20801 (highcharts)
π Read
via "National Vulnerability Database".
In js/parts/SvgRenderer.js in Highcharts JS before 6.1.0, the use of backtracking regular expressions permitted an attacker to conduct a denial of service attack against the SVGRenderer component, aka ReDoS.π Read
via "National Vulnerability Database".
π΄ Anomaly Detection Techniques: Defining Normal π΄
π Read
via "Dark Reading: ".
The challenge is identifying suspicious events in training sets where no anomalies are encountered. Part two of a two-part series.π Read
via "Dark Reading: ".
Darkreading
Anomaly Detection Techniques: Defining Normal
The challenge is identifying suspicious events in training sets where no anomalies are encountered. Part two of a two-part series.
π βSecuring the mobile enterprise means thinking outside the VPN box π
π Read
via "Security on TechRepublic".
As employees access clouds and apps untethered to corporate networks, managers must create new security architectures.π Read
via "Security on TechRepublic".
TechRepublic
βSecuring the mobile enterprise means thinking outside the VPN box
As employees access clouds and apps untethered to corporate networks, managers must create new security architectures.
β Zero-Days in Counter-Strike Client Used to Build Major Botnet β
π Read
via "Threatpost".
A full 39 percent of Counter-Strike 1.6 game servers on Steam were found to be malicious.π Read
via "Threatpost".
Threat Post
Zero-Days in Counter-Strike Client Used to Build Major Botnet
A full 39 percent of Counter-Strike 1.6 game servers on Steam were found to be malicious.
β IMAP-Based Attacks Compromising Accounts at βUnprecedented Scaleβ β
π Read
via "Threatpost".
Attackers are increasingly using insecure legacy protocols, like IMAP, to bypass multi-factor authentication in password spraying campaigns.π Read
via "Threatpost".
Threat Post
Threatlist: IMAP-Based Attacks Compromising Accounts at βUnprecedented Scaleβ
Attackers are increasingly targeting insecure legacy protocols, like IMAP, to avoid running into multi-factor authentication in password-spraying campaigns.
ATENTIONβΌ New - CVE-2018-12215
π Read
via "National Vulnerability Database".
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12214
π Read
via "National Vulnerability Database".
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables a privileged user to execute arbitrary code via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12213
π Read
via "National Vulnerability Database".
Potential memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12212
π Read
via "National Vulnerability Database".
Buffer overflow in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12211
π Read
via "National Vulnerability Database".
Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12210
π Read
via "National Vulnerability Database".
Multiple pointer dereferences in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.π Read
via "National Vulnerability Database".