π΄ Two Found Guilty in Online Dating, BEC Scheme π΄
π Read
via "Dark Reading: ".
Cybercriminals involved in the operation created fake online dating profiles and tricked victims into sending money to phony bank accounts.π Read
via "Dark Reading: ".
Darkreading
Two Found Guilty in Online Dating, BEC Scheme
Cybercriminals involved in the operation created fake online dating profiles and tricked victims into sending money to phony bank accounts.
β Analysis: Drone Tech Creates New Type of Blended Threat β
π Read
via "Threatpost".
Hacked drones are breaching physical and cyberdefenses to cause disruption and steal data, experts warn.π Read
via "Threatpost".
Threat Post
Drones are Quickly Becoming a Cybersecurity Nightmare
Whether it be geofence cutting or aerial network sniffing, drones are increasingly viewed as a cybersecurity threat.
π΄ Inside Incident Response: 6 Key Tips to Keep in Mind π΄
π Read
via "Dark Reading: ".
Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach.π Read
via "Dark Reading: ".
Darkreading
Inside Incident Response: 6 Key Tips to Keep in Mind
Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach.
β Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project β
π Read
via "Threatpost".
Users of the open-source project should upgrade immediately.π Read
via "Threatpost".
Threat Post
Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project
Users of the open-source project should upgrade immediately.
β Google Play Touts Certs in Quest For Enterprise Security β
π Read
via "Threatpost".
Google has snagged three security and privacy certifications for Google Play as it tries to appeal to enterprises despite numerous malicious apps and security issues.π Read
via "Threatpost".
Threat Post
Google Play Touts Certs in Quest For Enterprise Security
Google has snagged three security and privacy certifications for Google Play as it tries to appeal to enterprises despite numerous malicious apps and security issues.
β Firefox and Edge Fall to Hackers on Day Two of Pwn2Own β
π Read
via "Threatpost".
Browsers Firefox and Edge take a beating on day two of the Pwn2Own competition.π Read
via "Threatpost".
Threat Post
Firefox and Edge Fall to Hackers on Day Two of Pwn2Own
Browsers Firefox and Edge take a beating on day two of the Pwn2Own competition.
β Spycams Secretly Live-Streamed 1,600 Motel Guests β
π Read
via "Threatpost".
Four have been arrested in the case.π Read
via "Threatpost".
Threat Post
Spycams Secretly Live-Streamed 1,600 Motel Guests
Four have been arrested in the case.
β Facebook password crisis β what to do? [VIDEO] β
π Read
via "Naked Security".
Watch this special edition of Naked Security Live - we answer the questions people have been asking us, like "Should I stay or should I go?"π Read
via "Naked Security".
Naked Security
Facebook password crisis β what to do? [VIDEO]
Watch this special edition of Naked Security Live β we answer the questions people have been asking us, like βShould I stay or should I go?β
ATENTIONβΌ New - CVE-2016-10743
π Read
via "National Vulnerability Database".
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-3965
π Read
via "National Vulnerability Database".
Hospira Symbiq Infusion System 3.13 and earlier allows remote authenticated users to trigger "unanticipated operations" by leveraging "elevated privileges" for an unspecified call to an incorrectly exposed function.π Read
via "National Vulnerability Database".
β Monday review β the hot 29 stories of the week β
π Read
via "Naked Security".
From an ex-employee from IT hell to Window 7's upcoming patchocalypse, and everything in between. It's weekly roundup time!π Read
via "Naked Security".
Naked Security
Monday review β the hot 29 stories of the week
From an ex-employee from IT hell to Window 7βs upcoming patchocalypse, and everything in between. Itβs weekly roundup time!
β New ratings point to keyless cars that can stand up to relay attacks β
π Read
via "Naked Security".
Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.π Read
via "Naked Security".
Naked Security
New ratings point to keyless cars that can stand up to relay attacks
Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.
β Update now! WordPress hackers target Easy WP SMTP plugin β
π Read
via "Naked Security".
Two hacking groups have been spotted targeting websites running unpatched versions of the WordPress plugin Easy WP SMTP.π Read
via "Naked Security".
β Thousands of API and cryptographic keys leaking on GitHub every day β
π Read
via "Naked Security".
Researchers have found that one of the most popular source code repositories in the world is still housing thousands of publicly accessible user credentials.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Hacking Cars For Fun and Profit at Pwn2Own π
π Read
via "Subscriber Blog RSS Feed ".
Web browsers, virtualization software, even cars β nothing was off guards last week at Pwn2Own, the annual hacking competition held each year alongside CanSecWest in Vancouver.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Hacking Cars For Fun and Profit at Pwn2Own
Web browsers, virtualization software, even cars β nothing was off guards last week at Pwn2Own, the annual hacking competition held each year alongside CanSecWest in Vancouver.
π Why site reliability engineers face more security incidents and higher stress levels π
π Read
via "Security on TechRepublic".
Half of SREs have worked on outages lasting longer than a day, according to a Catchpoint report.π Read
via "Security on TechRepublic".
TechRepublic
Why site reliability engineers face more security incidents and higher stress levels
Half of SREs have worked on outages lasting longer than a day, according to a Catchpoint report.
π Why 61% of CIOs believe employees maliciously leak data π
π Read
via "Security on TechRepublic".
One in five employees surveyed believes data belongs to them, not the company, according to an Opinion Matters / Egress report.π Read
via "Security on TechRepublic".
TechRepublic
Why 61% of CIOs believe employees maliciously leak data
One in five employees surveyed believes data belongs to them, not the company, according to an Opinion Matters / Egress report.
π How to stop remote workers from causing a security incident: 3 tips π
π Read
via "Security on TechRepublic".
Some 36% of organizations said they experience security breaches due to remote work, according to an OpenVPN report. Here's how to help.π Read
via "Security on TechRepublic".
TechRepublic
How to stop remote workers from causing a security incident: 3 tips
Some 36% of organizations said they experience security breaches due to remote work, according to an OpenVPN report. Here's how to help.
β FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors β
π Read
via "Threatpost".
The contractor with whom it shared the data has a vulnerable, unpatched network.π Read
via "Threatpost".
Threat Post
FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors
The contractor with whom it shared the data has a vulnerable, unpatched network.
π΄ A Glass Ceiling? Not in Privacy π΄
π Read
via "Dark Reading: ".
According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%.π Read
via "Dark Reading: ".
Dark Reading
A Glass Ceiling? Not in Privacy
According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%.
π Top 5 business concerns about public cloud applications π
π Read
via "Security on TechRepublic".
Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 business concerns about public cloud applications
Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report.