β New scam accuses you of child abuse, offers to remove evidence β
π Read
via "Naked Security".
This scam is both intimidating and disturbing - the crooks are presenting themselves as corrupt CIA officials who will take a bribe.π Read
via "Naked Security".
Naked Security
New scam accuses you of child abuse, offers to remove evidence
This scam is both intimidating and disturbing β the crooks are presenting themselves as corrupt CIA officials who will take a bribe.
β Old Tech Spills Digital Dirt on Past Owners β
π Read
via "Threatpost".
Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.π Read
via "Threatpost".
Threat Post
Old Tech Spills Digital Dirt on Past Owners
Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.
π΄ The Case of the Missing Data π΄
π Read
via "Dark Reading: ".
The latest twist in the Equifax breach has serious implications for organizations.π Read
via "Dark Reading: ".
Darkreading
The Case of the Missing Data
The latest twist in the Equifax breach has serious implications for organizations.
π Help Needed to Solve AI Data Protection Challenges π
π Read
via "Subscriber Blog RSS Feed ".
The UK's data protection authority is hoping that advances to artificial intelligence incorporate data protection by design and is seeking the public's opinion on how to do so.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Help Needed to Solve AI Data Protection Challenges
The UK's data protection authority is hoping that advances to artificial intelligence incorporate data protection by design and is seeking the public's opinion on how to do so.
π΄ 6 Ways Mature DevOps Teams Are Killing It in Security π΄
π Read
via "Dark Reading: ".
New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.π Read
via "Dark Reading: ".
Dark Reading
6 Ways Mature DevOps Teams Are Killing It in Security
New survey shows where elite DevOps organizations are better able to incorporate security into application security.
β Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack β
π Read
via "Threatpost".
Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.π Read
via "Threatpost".
Threat Post
Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack
Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.
π΄ DDoS Attack Size Drops 85% in Q4 2018 π΄
π Read
via "Dark Reading: ".
The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.π Read
via "Dark Reading: ".
Dark Reading
DDoS Attack Size Drops 85% in Q4 2018
The sharp decline follows an FBI takedown of so-called booter, or DDoS-for-hire, websites in December 2018.
β Host of Flaws Found in CUJO Smart Firewall β
π Read
via "Threatpost".
Some of the flaws would allow remote code-execution.π Read
via "Threatpost".
Threat Post
Host of Flaws Found in CUJO Smart Firewall
Some of the flaws would allow remote code-execution.
β Cardinal RAT Resurrected to Target FinTech Firms β
π Read
via "Threatpost".
A long-quiet malware family has been spotted targeting financial technology firms, armed with new obfuscation techniques to avoid detection.π Read
via "Threatpost".
Threat Post
Cardinal RAT Resurrected to Target FinTech Firms
A long-quiet malware family has been spotted targeting financial technology firms, armed with new obfuscation techniques to avoid detection.
π΄ Microsoft Office Dominates Most Exploited List π΄
π Read
via "Dark Reading: ".
Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.π Read
via "Dark Reading: ".
Darkreading
Microsoft Office Dominates Most Exploited List
Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.
β Elsevier exposes usersβ emails and passwords online β
π Read
via "Naked Security".
The science publisher is blaming a misconfigured server that exposed a constant stream of its usersβ credentials.π Read
via "Naked Security".
Naked Security
Elsevier exposes usersβ emails and passwords online
The science publisher is blaming a misconfigured server that exposed a constant stream of its usersβ credentials.
β Hacked tornado warning systems leave Texans in the dark β
π Read
via "Naked Security".
Add this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents.π Read
via "Naked Security".
Naked Security
Hacked tornado warning systems leave Texans in the dark
Add this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents.
β Firefox 66 now blocks autoplaying audio by default β
π Read
via "Naked Security".
From Firefox 66 for desktop and Android, due in March, media autoplay of video or audio will be blocked by default.π Read
via "Naked Security".
Naked Security
Firefox 66 now blocks autoplaying audio by default
From Firefox 66 for desktop and Android, due in March, media autoplay of video or audio will be blocked by default.
β Researchers fret over Netflix interactive TV traffic snooping β
π Read
via "Naked Security".
No sooner has Netflix made an interactive TV show than people are already pulling apart its privacy implications.π Read
via "Naked Security".
Naked Security
Researchers fret over Netflix interactive TV traffic snooping
No sooner has Netflix made an interactive TV show than people are already pulling apart its privacy implications.
β Google researcher discovers new type of Windows security weakness β
π Read
via "Naked Security".
Microsoft will patch a new Windows security bug discovered by Google Project Zero - despite finding no evidence that it poses a threat.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Why 91% of IT and security pros fear insider threats π
π Read
via "Security on TechRepublic".
Insider threats are a larger concern for most organizations than cybercriminals or hacktivists, according to a BetterCloud report.π Read
via "Security on TechRepublic".
TechRepublic
Why 91% of IT and security pros fear insider threats
Insider threats are a larger concern for most organizations than cybercriminals or hacktivists, according to a BetterCloud report.
π Vulnerability in SoftNAS Cloud allows attackers to bypass authentication π
π Read
via "Security on TechRepublic".
The vulnerability allows attackers to run arbitrary commands as root, which clearly undermines the security of the SoftNAS Cloud platform and data stored on it.π Read
via "Security on TechRepublic".
TechRepublic
Vulnerability in SoftNAS Cloud allows attackers to bypass authentication
The vulnerability allows attackers to run arbitrary commands as root, which clearly undermines the security of the SoftNAS Cloud platform and data stored on it.
β Ep. 024 β Sextortion, malicious adverts and randomness [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - listen now!π Read
via "Naked Security".
Naked Security
Ep. 024 β Sextortion, malicious adverts and randomness [PODCAST]
Hereβs the latest Naked Security podcast β listen now!
π΄ TLS 1.3: A Good News/Bad News Scenario π΄
π Read
via "Dark Reading: ".
Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic.π Read
via "Dark Reading: ".
Darkreading
TLS 1.3: A Good News/Bad News Scenario
Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic.
π΄ What the Transition to Smart Cards Can Teach the US Healthcare Industry π΄
π Read
via "Dark Reading: ".
Healthcare information security suffers from the inherent weakness of using passwords to guard information. Chip-based smart cards could change that.π Read
via "Dark Reading: ".
Darkreading
What the Transition to Smart Cards Can Teach the US Healthcare Industry
Healthcare information security suffers from the inherent weakness of using passwords to guard information. Chip-based smart cards could change that.
β Uber Deployed βSurfcamβ Spyware in Australia to Crush the Competition β
π Read
via "Threatpost".
Until a report this week, Uber's Surfcam's use was thought to be limited to incidents uncovered in Singapore in 2017.π Read
via "Threatpost".
Threat Post
Uber Deployed βSurfcam Spywareβ in Australia to Crush the Competition β Report
Until a report this week, Uber's Surfcam's use was thought to be limited to incidents uncovered in Singapore in 2017.