π Friday Five: 3/15 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Building a better voting machine, a government tool to secure critical infrastructure, and the Facebook outage heard around the world - catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 3/15 Edition
Building a better voting machine, a government tool to secure critical infrastructure, and the Facebook outage heard around the world - catch up on the week's news with this roundup!
π΄ Could Beto O'Rourke Become the First Hacker President? π΄
π Read
via "Dark Reading: ".
New report details the Democratic candidate's time as a member of Cult of the Dead Cow.π Read
via "Dark Reading: ".
Dark Reading
Could Beto O'Rourke Become the First Hacker President?
New report details the Democratic candidate's time as a member of Cult of the Dead Cow.
β Lenovo Patches High-Severity Arbitrary Code Execution Flaws β
π Read
via "Threatpost".
Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.π Read
via "Threatpost".
Threat Post
Lenovo Patches Intel Firmware Flaws in Multiple Product Lines
Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.
π Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure π
π Read
via "Security on TechRepublic".
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.π Read
via "Security on TechRepublic".
TechRepublic
Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.
π΄ 7 Low-Cost Security Tools π΄
π Read
via "Dark Reading: ".
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.π Read
via "Dark Reading: ".
Dark Reading
7 Low-Cost Security Tools
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.
π Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure π
π Read
via "Security on TechRepublic".
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.π Read
via "Security on TechRepublic".
TechRepublic
Facebook-Cambridge Analytica privacy scandal: Your data still isn't secure
On the one-year anniversary of the Facebook-Cambridge Analytica data privacy scandal, Dan Patterson advises companies to stay vigilant and keep data locked down and secure.
π΄ Don't Miss these Intriguing Black Hat Asia Briefings π΄
π Read
via "Dark Reading: ".
With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!π Read
via "Dark Reading: ".
Dark Reading
Don't Miss these Intriguing Black Hat Asia Briefings - Dark Reading
With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!
π΄ Don't Miss these Intriguing Black Hat Asia Briefings π΄
π Read
via "Dark Reading: ".
With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!π Read
via "Dark Reading: ".
Dark Reading
Don't Miss these Intriguing Black Hat Asia Briefings
With two weeks to go, organizers would like to quickly highlight some Black Hat Asia Briefings that you may have overlooked!
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From a Citrix breach to John Oliver's FCC anti-robocall campaign, and everything in between - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From a Citrix breach to John Oliverβs FCC anti-robocall campaign, and everything in between β itβs weekly roundup time.
β WordPress 5.1.1 patches dangerous XSS vulnerability β
π Read
via "Naked Security".
Researchers have offered more detail on a recently patched vulnerability that would allow an attacker to take over a WordPress site.π Read
via "Naked Security".
Naked Security
WordPress 5.1.1 patches dangerous XSS vulnerability
Researchers have offered more detail on a recently patched vulnerability that would allow an attacker to take over a WordPress site.
β G Suite admins can now disallow SMS and voice authentication β
π Read
via "Naked Security".
Users of G Suite may find that the option to authenticate themselves via SMS or voice call has suddenly disappeared.π Read
via "Naked Security".
Naked Security
G Suite admins can now disallow SMS and voice authentication
Users of G Suite may find that the option to authenticate themselves via SMS or voice call has suddenly disappeared.
β Intel releases patches for code execution vulnerabilities β
π Read
via "Naked Security".
Intel released patches last week, fixing a range of vulnerabilities that could allow attackers to execute code on affected devices.π Read
via "Naked Security".
Naked Security
Intel releases patches for code execution vulnerabilities
Intel released patches last week, fixing a range of vulnerabilities that could allow attackers to execute code on affected devices.
β DARPA is working on an open source, secure e-voting system β
π Read
via "Naked Security".
The US Government is working on an electronic voting system that it hopes will prevent people from tinkering with voting machines at the polls.π Read
via "Naked Security".
Naked Security
DARPA is working on an open source, secure e-voting system
The US Government is working on an electronic voting system that it hopes will prevent people from tinkering with voting machines at the polls.
π Slack's new enterprise-grade security tool lets you add encryption keys for more data control π
π Read
via "Security on TechRepublic".
Slack Enterprise Key Management offers more security for Enterprise Grid users in regulated industries.π Read
via "Security on TechRepublic".
TechRepublic
Slack's new enterprise-grade security tool lets you add encryption keys for more data control
Slack Enterprise Key Management offers more security for Enterprise Grid users in regulated industries.
π DDoS attacks on the rise: Largest attack ever hit 1.7 Tb/second π
π Read
via "Security on TechRepublic".
Hackers are increasingly trying to steal data instead of money from victims, according to Positive Technologies.π Read
via "Security on TechRepublic".
TechRepublic
DDoS attacks on the rise: Largest attack ever hit 1.7 Tb/second
Hackers are increasingly trying to steal data instead of money from victims, according to Positive Technologies.
π΄ Are You Prepared for a Zombie (Domain) Apocalypse? π΄
π Read
via "Dark Reading: ".
When a domain registration expires, they can be claimed by new owners. And sometimes, those new owners have malicious intent.π Read
via "Dark Reading: ".
Darkreading
Are You Prepared for a Zombie (Domain) Apocalypse?
When a domain registration expires, they can be claimed by new owners. And sometimes, those new owners have malicious intent.
π Avoid these Google Play Store apps that promise to update your Android phone π
π Read
via "Security on TechRepublic".
Apps in the Google Play Store purport to upgrade your phone to Android 9.0 Pie, but an app cannot perform that task.π Read
via "Security on TechRepublic".
TechRepublic
Avoid these Google Play Store apps that promise to update your Android phone
Apps in the Google Play Store purport to upgrade your phone to Android 9.0 Pie, but an app cannot perform that task.
π 5 ways to properly secure new technology π
π Read
via "Security on TechRepublic".
Automating security and system standards eliminates the potential for human error.π Read
via "Security on TechRepublic".
TechRepublic
5 ways to properly secure new technology
Automating security and system standards eliminates the potential for human error.
β Privacy Regulations Needed for Next-Gen Cars β
π Read
via "Threatpost".
With wide deployment expected in the next decade, the driverless automobile landscape looks fraught β from road safety to data protection.π Read
via "Threatpost".
Threat Post
Privacy Regulations Needed for Next-Gen Cars
With wide deployment expected in the next decade, the driverless automobile landscape looks fraught β from road safety to data protection.
β Google Gives Users More Choice with Location-Tracking Apps β
π Read
via "Threatpost".
Developers will have a new option to for Android apps too track location only when in use.π Read
via "Threatpost".
Threat Post
Google Gives Users More Choice with Location-Tracking Apps
Developers will have a new option to for Android apps to track location only when in use.
β Mirai Variant Goes After Enterprise Systems β
π Read
via "Threatpost".
The newest Mirai variant is targeting WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs used by enterprises.π Read
via "Threatpost".
Threat Post
Mirai Variant Goes After Enterprise Systems
The newest Mirai variant is targeting WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs used by enterprises.