ATENTIONβΌ New - CVE-2018-12187
π Read
via "National Vulnerability Database".
Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12185
π Read
via "National Vulnerability Database".
Insufficient input validation in Intel(R) AMT in Intel(R) CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially execute arbitrary code via physical access.π Read
via "National Vulnerability Database".
π΄ Ransomware's New Normal π΄
π Read
via "Dark Reading: ".
GandCrab's evolution underscores a shift in ransomware attack methods.π Read
via "Dark Reading: ".
Dark Reading
Ransomware's New Normal
GandCrab's evolution underscores a shift in ransomware attack methods.
π΄ Criminals Use One Line of Code to Steal Card Data from E-Commerce Sites π΄
π Read
via "Dark Reading: ".
New JavaScript Sniffer is similar to malware used in the Magecart campaign last year that affected over 800 sites.π Read
via "Dark Reading: ".
Darkreading
Criminals Use One Line of Code to Steal Card Data from E-Commerce Sites
New JavaScript sniffer is similar to malware used in the Magecart campaign last year that affected over 800 sites.
β Will the next version of Android get location privacy right? β
π Read
via "Naked Security".
Google has confirmed that improved control over location tracking is one of several new privacy features in the next version of its mobile OS, Android Q.π Read
via "Naked Security".
Naked Security
Will the next version of Android get location privacy right?
Google has confirmed that improved control over location tracking is one of several new privacy features in the next version of its mobile OS, Android Q.
β How to make DuckDuckGo your default Chrome search engine β
π Read
via "Naked Security".
Good news for the privacy-conscious. Chrome 73, released Tuesday, now includes the DuckDuckGo search engine as an option.π Read
via "Naked Security".
Naked Security
How to make DuckDuckGo your default Chrome search engine
Good news for the privacy-conscious. Chrome 73, released Tuesday, now includes the DuckDuckGo search engine as an option.
β Facebook outage coincides with (or causes?) 3m new Telegram users β
π Read
via "Naked Security".
A worldwide, nearly day-long outage at Facebook led to Telegram having a busy, busy day.π Read
via "Naked Security".
Naked Security
Facebook outage coincides with (or causes?) 3m new Telegram users
A worldwide, nearly day-long outage at Facebook led to Telegram having a busy, busy day.
β Ep. 023 β Facebook promises and Google Chrome patches [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - listen now, and tell your friends and colleagues about us, too!π Read
via "Naked Security".
Naked Security
Ep. 023 β Facebook promises and Google Chrome patches [PODCAST]
Hereβs the latest Naked Security podcast β listen now, and tell your friends and colleagues about us, too!
π How to view passwords in Android Chrome π
π Read
via "Security on TechRepublic".
If you can't remember a password for a website you know Chrome saved, you can view it with these tips.π Read
via "Security on TechRepublic".
TechRepublic
How to view passwords in Android Chrome
When you can't remember a password for a website you know Chrome saved, never fear. You can view it with these tips.
π΄ On Norman Castles and the Internet π΄
π Read
via "Dark Reading: ".
When the Normans conquered England, they built castles to maintain security. But where are the castles of the Internet?π Read
via "Dark Reading: ".
Darkreading
On Norman Castles and the Internet
When the Normans conquered England, they built castles to maintain security. But where are the castles of the Internet?
β You left WHAT on that USB drive?! β
π Read
via "Naked Security".
Nudies, taxes, and memos - oh, my! Research shows that even if we think we've deleted content on the sticks, we're leaving all that and more.π Read
via "Naked Security".
Naked Security
You left WHAT on that USB drive?!
Nudies, taxes, and memos β oh, my! Research shows that even if we think weβve deleted content on the sticks, weβre leaving all that and more.
β Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection β
π Read
via "Threatpost".
An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.π Read
via "Threatpost".
Threat Post
Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection
An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.
π΄ Proof-of-Concept Tracking System Finds RATs Worldwide π΄
π Read
via "Dark Reading: ".
Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.π Read
via "Dark Reading: ".
Dark Reading
Proof-of-Concept Tracking System Finds RATs Worldwide - Dark Reading
Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.
π How an unsecured Elasticsearch server exposed customer order information and passwords π
π Read
via "Security on TechRepublic".
Chinese e-commerce giant Globalegrow left personally identifiable information and account credentials exposed, leading security researchers to call them "delusional."π Read
via "Security on TechRepublic".
TechRepublic
How an unsecured Elasticsearch server exposed customer order information and passwords
Chinese e-commerce giant Globalegrow left personally identifiable information and account credentials exposed, leading security researchers to call them "delusional."
β Sextortion β whatβs new, and what to do [VIDEO] β
π Read
via "Naked Security".
Share this video with your less tech-savvy friends and family to set their minds at rest about sextortion.π Read
via "Naked Security".
Naked Security
Sextortion β whatβs new, and what to do [VIDEO]
Share this video with your less tech-savvy friends and family to set their minds at rest about sextortion.
π Friday Five: 3/15 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Building a better voting machine, a government tool to secure critical infrastructure, and the Facebook outage heard around the world - catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 3/15 Edition
Building a better voting machine, a government tool to secure critical infrastructure, and the Facebook outage heard around the world - catch up on the week's news with this roundup!
π΄ Could Beto O'Rourke Become the First Hacker President? π΄
π Read
via "Dark Reading: ".
New report details the Democratic candidate's time as a member of Cult of the Dead Cow.π Read
via "Dark Reading: ".
Dark Reading
Could Beto O'Rourke Become the First Hacker President?
New report details the Democratic candidate's time as a member of Cult of the Dead Cow.
β Lenovo Patches High-Severity Arbitrary Code Execution Flaws β
π Read
via "Threatpost".
Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.π Read
via "Threatpost".
Threat Post
Lenovo Patches Intel Firmware Flaws in Multiple Product Lines
Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.
π Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure π
π Read
via "Security on TechRepublic".
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.π Read
via "Security on TechRepublic".
TechRepublic
Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.
π΄ 7 Low-Cost Security Tools π΄
π Read
via "Dark Reading: ".
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.π Read
via "Dark Reading: ".
Dark Reading
7 Low-Cost Security Tools
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.
π Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure π
π Read
via "Security on TechRepublic".
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.π Read
via "Security on TechRepublic".
TechRepublic
Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.