β You left WHAT on that USB drive?! β
π Read
via "Naked Security".
Nudies, taxes, and memos - oh, my! Research shows that even if we think we've deleted content on the sticks, we're leaving all that and more.π Read
via "Naked Security".
Naked Security
You left WHAT on that USB drive?!
Nudies, taxes, and memos β oh, my! Research shows that even if we think weβve deleted content on the sticks, weβre leaving all that and more.
β Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection β
π Read
via "Threatpost".
An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.π Read
via "Threatpost".
Threat Post
Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection
An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.
π΄ Proof-of-Concept Tracking System Finds RATs Worldwide π΄
π Read
via "Dark Reading: ".
Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.π Read
via "Dark Reading: ".
Dark Reading
Proof-of-Concept Tracking System Finds RATs Worldwide - Dark Reading
Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.
π How an unsecured Elasticsearch server exposed customer order information and passwords π
π Read
via "Security on TechRepublic".
Chinese e-commerce giant Globalegrow left personally identifiable information and account credentials exposed, leading security researchers to call them "delusional."π Read
via "Security on TechRepublic".
TechRepublic
How an unsecured Elasticsearch server exposed customer order information and passwords
Chinese e-commerce giant Globalegrow left personally identifiable information and account credentials exposed, leading security researchers to call them "delusional."
β Sextortion β whatβs new, and what to do [VIDEO] β
π Read
via "Naked Security".
Share this video with your less tech-savvy friends and family to set their minds at rest about sextortion.π Read
via "Naked Security".
Naked Security
Sextortion β whatβs new, and what to do [VIDEO]
Share this video with your less tech-savvy friends and family to set their minds at rest about sextortion.
π Friday Five: 3/15 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Building a better voting machine, a government tool to secure critical infrastructure, and the Facebook outage heard around the world - catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 3/15 Edition
Building a better voting machine, a government tool to secure critical infrastructure, and the Facebook outage heard around the world - catch up on the week's news with this roundup!
π΄ Could Beto O'Rourke Become the First Hacker President? π΄
π Read
via "Dark Reading: ".
New report details the Democratic candidate's time as a member of Cult of the Dead Cow.π Read
via "Dark Reading: ".
Dark Reading
Could Beto O'Rourke Become the First Hacker President?
New report details the Democratic candidate's time as a member of Cult of the Dead Cow.
β Lenovo Patches High-Severity Arbitrary Code Execution Flaws β
π Read
via "Threatpost".
Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.π Read
via "Threatpost".
Threat Post
Lenovo Patches Intel Firmware Flaws in Multiple Product Lines
Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.
π Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure π
π Read
via "Security on TechRepublic".
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.π Read
via "Security on TechRepublic".
TechRepublic
Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.
π΄ 7 Low-Cost Security Tools π΄
π Read
via "Dark Reading: ".
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.π Read
via "Dark Reading: ".
Dark Reading
7 Low-Cost Security Tools
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.
π Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure π
π Read
via "Security on TechRepublic".
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.π Read
via "Security on TechRepublic".
TechRepublic
Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.
π΄ Don't Miss these Intriguing Black Hat Asia Briefings π΄
π Read
via "Dark Reading: ".
With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!π Read
via "Dark Reading: ".
Dark Reading
Don't Miss these Intriguing Black Hat Asia Briefings - Dark Reading
With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!
π΄ Don't Miss these Intriguing Black Hat Asia Briefings π΄
π Read
via "Dark Reading: ".
With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!π Read
via "Dark Reading: ".
Dark Reading
Don't Miss these Intriguing Black Hat Asia Briefings
With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From a Citrix breach to John Oliver's FCC anti-robocall campaign, and everything in between - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From a Citrix breach to John Oliverβs FCC anti-robocall campaign, and everything in between β itβs weekly roundup time.
β WordPress 5.1.1 patches dangerous XSS vulnerability β
π Read
via "Naked Security".
Researchers have offered more detail on a recently patched vulnerability that would allow an attacker to take over a WordPress site.π Read
via "Naked Security".
Naked Security
WordPress 5.1.1 patches dangerous XSS vulnerability
Researchers have offered more detail on a recently patched vulnerability that would allow an attacker to take over a WordPress site.
β G Suite admins can now disallow SMS and voice authentication β
π Read
via "Naked Security".
Users of G Suite may find that the option to authenticate themselves via SMS or voice call has suddenly disappeared.π Read
via "Naked Security".
Naked Security
G Suite admins can now disallow SMS and voice authentication
Users of G Suite may find that the option to authenticate themselves via SMS or voice call has suddenly disappeared.
β Intel releases patches for code execution vulnerabilities β
π Read
via "Naked Security".
Intel released patches last week, fixing a range of vulnerabilities that could allow attackers to execute code on affected devices.π Read
via "Naked Security".
Naked Security
Intel releases patches for code execution vulnerabilities
Intel released patches last week, fixing a range of vulnerabilities that could allow attackers to execute code on affected devices.
β DARPA is working on an open source, secure e-voting system β
π Read
via "Naked Security".
The US Government is working on an electronic voting system that it hopes will prevent people from tinkering with voting machines at the polls.π Read
via "Naked Security".
Naked Security
DARPA is working on an open source, secure e-voting system
The US Government is working on an electronic voting system that it hopes will prevent people from tinkering with voting machines at the polls.
π Slack's new enterprise-grade security tool lets you add encryption keys for more data control π
π Read
via "Security on TechRepublic".
Slack Enterprise Key Management offers more security for Enterprise Grid users in regulated industries.π Read
via "Security on TechRepublic".
TechRepublic
Slack's new enterprise-grade security tool lets you add encryption keys for more data control
Slack Enterprise Key Management offers more security for Enterprise Grid users in regulated industries.
π DDoS attacks on the rise: Largest attack ever hit 1.7 Tb/second π
π Read
via "Security on TechRepublic".
Hackers are increasingly trying to steal data instead of money from victims, according to Positive Technologies.π Read
via "Security on TechRepublic".
TechRepublic
DDoS attacks on the rise: Largest attack ever hit 1.7 Tb/second
Hackers are increasingly trying to steal data instead of money from victims, according to Positive Technologies.
π΄ Are You Prepared for a Zombie (Domain) Apocalypse? π΄
π Read
via "Dark Reading: ".
When a domain registration expires, they can be claimed by new owners. And sometimes, those new owners have malicious intent.π Read
via "Dark Reading: ".
Darkreading
Are You Prepared for a Zombie (Domain) Apocalypse?
When a domain registration expires, they can be claimed by new owners. And sometimes, those new owners have malicious intent.