β Microsoft Windows 7 patch warns of coming patchocalypse β
π Read
via "Naked Security".
Microsoft has issued a patch to remind Windows 7 users that theyβll soon have no patches.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Windows 10 DHCP vulnerability allows for remote code execution π
π Read
via "Security on TechRepublic".
The vulnerability in Windows 10 and Windows Server 2019 gives attackers an entry point for further exploitation when combined with other vulnerabilities.π Read
via "Security on TechRepublic".
TechRepublic
Windows 10 DHCP vulnerability allows for remote code execution
The vulnerability in Windows 10 and Windows Server 2019 gives attackers an entry point for further exploitation when combined with other vulnerabilities.
β BitLocker hacked? Disk encryption β and why you still need it [VIDEO] β
π Read
via "Naked Security".
Is BitLocker cracked? Is disk encryption still worth it? The answers are "No" and "Yes", and here's why.π Read
via "Naked Security".
Naked Security
BitLocker hacked? Disk encryption β and why you still need it [VIDEO]
Is BitLocker cracked? Is disk encryption still worth it? The answers are βNoβ and βYesβ, and hereβs why.
π΄ Security Lessons from My Game Closet π΄
π Read
via "Dark Reading: ".
In an era of popular video games like Fortnite and Minecraft, there is a lot to be learned about risk, luck, and strategy from some old-fashioned board games.π Read
via "Dark Reading: ".
Darkreading
Security Lessons from My Game Closet
In an era of popular video games like Fortnite and Minecraft, there is a lot to be learned about risk, luck, and strategy from some old-fashioned board games.
β Medtronic Defibrillators Have Critical Flaws, Warns DHS β
π Read
via "Threatpost".
The unpatched vulnerabilities exist in 20 products made by the popular Medtronics medical device manufacturer, including defibrillators and home patient monitoring systems.π Read
via "Threatpost".
Threat Post
Medtronic Defibrillators Have Critical Flaws, Warns DHS
The unpatched vulnerabilities exist in 20 products made by the popular Medtronics medical device manufacturer, including defibrillators and home patient monitoring systems.
π Friday Five: 3/22 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Looking back at last year's 230M person breach, Facebook's latest privacy slipup, and more - catch up on the week's infosec news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 3/22 Edition
Looking back at last year's 230M person breach, Facebook's latest privacy slipup, and more - catch up on the week's infosec news with this roundup!
π Facebook data privacy scandal: A cheat sheet π
π Read
via "Security on TechRepublic".
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.π Read
via "Security on TechRepublic".
TechRepublic
Facebook data privacy scandal: A cheat sheet
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.
π΄ Two Found Guilty in Online Dating, BEC Scheme π΄
π Read
via "Dark Reading: ".
Cybercriminals involved in the operation created fake online dating profiles and tricked victims into sending money to phony bank accounts.π Read
via "Dark Reading: ".
Darkreading
Two Found Guilty in Online Dating, BEC Scheme
Cybercriminals involved in the operation created fake online dating profiles and tricked victims into sending money to phony bank accounts.
β Analysis: Drone Tech Creates New Type of Blended Threat β
π Read
via "Threatpost".
Hacked drones are breaching physical and cyberdefenses to cause disruption and steal data, experts warn.π Read
via "Threatpost".
Threat Post
Drones are Quickly Becoming a Cybersecurity Nightmare
Whether it be geofence cutting or aerial network sniffing, drones are increasingly viewed as a cybersecurity threat.
π΄ Inside Incident Response: 6 Key Tips to Keep in Mind π΄
π Read
via "Dark Reading: ".
Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach.π Read
via "Dark Reading: ".
Darkreading
Inside Incident Response: 6 Key Tips to Keep in Mind
Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach.
β Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project β
π Read
via "Threatpost".
Users of the open-source project should upgrade immediately.π Read
via "Threatpost".
Threat Post
Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project
Users of the open-source project should upgrade immediately.
β Google Play Touts Certs in Quest For Enterprise Security β
π Read
via "Threatpost".
Google has snagged three security and privacy certifications for Google Play as it tries to appeal to enterprises despite numerous malicious apps and security issues.π Read
via "Threatpost".
Threat Post
Google Play Touts Certs in Quest For Enterprise Security
Google has snagged three security and privacy certifications for Google Play as it tries to appeal to enterprises despite numerous malicious apps and security issues.
β Firefox and Edge Fall to Hackers on Day Two of Pwn2Own β
π Read
via "Threatpost".
Browsers Firefox and Edge take a beating on day two of the Pwn2Own competition.π Read
via "Threatpost".
Threat Post
Firefox and Edge Fall to Hackers on Day Two of Pwn2Own
Browsers Firefox and Edge take a beating on day two of the Pwn2Own competition.
β Spycams Secretly Live-Streamed 1,600 Motel Guests β
π Read
via "Threatpost".
Four have been arrested in the case.π Read
via "Threatpost".
Threat Post
Spycams Secretly Live-Streamed 1,600 Motel Guests
Four have been arrested in the case.
β Facebook password crisis β what to do? [VIDEO] β
π Read
via "Naked Security".
Watch this special edition of Naked Security Live - we answer the questions people have been asking us, like "Should I stay or should I go?"π Read
via "Naked Security".
Naked Security
Facebook password crisis β what to do? [VIDEO]
Watch this special edition of Naked Security Live β we answer the questions people have been asking us, like βShould I stay or should I go?β
ATENTIONβΌ New - CVE-2016-10743
π Read
via "National Vulnerability Database".
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-3965
π Read
via "National Vulnerability Database".
Hospira Symbiq Infusion System 3.13 and earlier allows remote authenticated users to trigger "unanticipated operations" by leveraging "elevated privileges" for an unspecified call to an incorrectly exposed function.π Read
via "National Vulnerability Database".
β Monday review β the hot 29 stories of the week β
π Read
via "Naked Security".
From an ex-employee from IT hell to Window 7's upcoming patchocalypse, and everything in between. It's weekly roundup time!π Read
via "Naked Security".
Naked Security
Monday review β the hot 29 stories of the week
From an ex-employee from IT hell to Window 7βs upcoming patchocalypse, and everything in between. Itβs weekly roundup time!
β New ratings point to keyless cars that can stand up to relay attacks β
π Read
via "Naked Security".
Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.π Read
via "Naked Security".
Naked Security
New ratings point to keyless cars that can stand up to relay attacks
Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.
β Update now! WordPress hackers target Easy WP SMTP plugin β
π Read
via "Naked Security".
Two hacking groups have been spotted targeting websites running unpatched versions of the WordPress plugin Easy WP SMTP.π Read
via "Naked Security".
β Thousands of API and cryptographic keys leaking on GitHub every day β
π Read
via "Naked Security".
Researchers have found that one of the most popular source code repositories in the world is still housing thousands of publicly accessible user credentials.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News