β Spycams Secretly Live-Streamed 1,600 Motel Guests β
π Read
via "Threatpost".
Four have been arrested in the case.π Read
via "Threatpost".
Threat Post
Spycams Secretly Live-Streamed 1,600 Motel Guests
Four have been arrested in the case.
β Facebook password crisis β what to do? [VIDEO] β
π Read
via "Naked Security".
Watch this special edition of Naked Security Live - we answer the questions people have been asking us, like "Should I stay or should I go?"π Read
via "Naked Security".
Naked Security
Facebook password crisis β what to do? [VIDEO]
Watch this special edition of Naked Security Live β we answer the questions people have been asking us, like βShould I stay or should I go?β
ATENTIONβΌ New - CVE-2016-10743
π Read
via "National Vulnerability Database".
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-3965
π Read
via "National Vulnerability Database".
Hospira Symbiq Infusion System 3.13 and earlier allows remote authenticated users to trigger "unanticipated operations" by leveraging "elevated privileges" for an unspecified call to an incorrectly exposed function.π Read
via "National Vulnerability Database".
β Monday review β the hot 29 stories of the week β
π Read
via "Naked Security".
From an ex-employee from IT hell to Window 7's upcoming patchocalypse, and everything in between. It's weekly roundup time!π Read
via "Naked Security".
Naked Security
Monday review β the hot 29 stories of the week
From an ex-employee from IT hell to Window 7βs upcoming patchocalypse, and everything in between. Itβs weekly roundup time!
β New ratings point to keyless cars that can stand up to relay attacks β
π Read
via "Naked Security".
Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.π Read
via "Naked Security".
Naked Security
New ratings point to keyless cars that can stand up to relay attacks
Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.
β Update now! WordPress hackers target Easy WP SMTP plugin β
π Read
via "Naked Security".
Two hacking groups have been spotted targeting websites running unpatched versions of the WordPress plugin Easy WP SMTP.π Read
via "Naked Security".
β Thousands of API and cryptographic keys leaking on GitHub every day β
π Read
via "Naked Security".
Researchers have found that one of the most popular source code repositories in the world is still housing thousands of publicly accessible user credentials.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Hacking Cars For Fun and Profit at Pwn2Own π
π Read
via "Subscriber Blog RSS Feed ".
Web browsers, virtualization software, even cars β nothing was off guards last week at Pwn2Own, the annual hacking competition held each year alongside CanSecWest in Vancouver.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Hacking Cars For Fun and Profit at Pwn2Own
Web browsers, virtualization software, even cars β nothing was off guards last week at Pwn2Own, the annual hacking competition held each year alongside CanSecWest in Vancouver.
π Why site reliability engineers face more security incidents and higher stress levels π
π Read
via "Security on TechRepublic".
Half of SREs have worked on outages lasting longer than a day, according to a Catchpoint report.π Read
via "Security on TechRepublic".
TechRepublic
Why site reliability engineers face more security incidents and higher stress levels
Half of SREs have worked on outages lasting longer than a day, according to a Catchpoint report.
π Why 61% of CIOs believe employees maliciously leak data π
π Read
via "Security on TechRepublic".
One in five employees surveyed believes data belongs to them, not the company, according to an Opinion Matters / Egress report.π Read
via "Security on TechRepublic".
TechRepublic
Why 61% of CIOs believe employees maliciously leak data
One in five employees surveyed believes data belongs to them, not the company, according to an Opinion Matters / Egress report.
π How to stop remote workers from causing a security incident: 3 tips π
π Read
via "Security on TechRepublic".
Some 36% of organizations said they experience security breaches due to remote work, according to an OpenVPN report. Here's how to help.π Read
via "Security on TechRepublic".
TechRepublic
How to stop remote workers from causing a security incident: 3 tips
Some 36% of organizations said they experience security breaches due to remote work, according to an OpenVPN report. Here's how to help.
β FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors β
π Read
via "Threatpost".
The contractor with whom it shared the data has a vulnerable, unpatched network.π Read
via "Threatpost".
Threat Post
FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors
The contractor with whom it shared the data has a vulnerable, unpatched network.
π΄ A Glass Ceiling? Not in Privacy π΄
π Read
via "Dark Reading: ".
According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%.π Read
via "Dark Reading: ".
Dark Reading
A Glass Ceiling? Not in Privacy
According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%.
π Top 5 business concerns about public cloud applications π
π Read
via "Security on TechRepublic".
Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 business concerns about public cloud applications
Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report.
π΄ Dark Reading's Kelly Jackson Higgins Honored as Top Cybersecurity Journalist π΄
π Read
via "Dark Reading: ".
In voting conducted by the SANS Institute, Jackson Higgins is named by peers as one of the top 10 journalists in the industry.π Read
via "Dark Reading: ".
Dark Reading
Dark Reading's Kelly Jackson Higgins Honored as Top Cybersecurity Journalist
In voting conducted by the SANS Institute, Jackson Higgins is named by peers as one of the top 10 journalists in the industry.
β Some ASUS Updates Drop Backdoors on PCs in βOperation ShadowHammerβ β
π Read
via "Threatpost".
The attack appears to be associated with a China-backed APT actor.π Read
via "Threatpost".
Threat Post
Some ASUS Updates Drop Backdoors on PCs in βOperation ShadowHammerβ
The attack appears to be associated with a China-backed APT actor.
π How to install OpenSSH on Windows 10 to encrypt network communications π
π Read
via "Security on TechRepublic".
Learn how to use SSH natively within Windows 10 to secure communications between network devices.π Read
via "Security on TechRepublic".
TechRepublic
How to install OpenSSH on Windows 10 to encrypt network communications
Learn how to use SSH natively within Windows 10 to secure communications between network devices.
β Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks β
π Read
via "Threatpost".
Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.π Read
via "Threatpost".
Threat Post
Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks
Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.
π΄ IT Leaders, Employees Divided on Data Security π΄
π Read
via "Dark Reading: ".
Execs and employees have dramatically different ideas of how much information is being lost and why - a gap that puts enterprise data in grave danger.π Read
via "Dark Reading: ".
Dark Reading
IT Leaders, Employees Divided on Data Security
Execs and employees have dramatically different ideas of how much information is being lost and why - a gap that puts enterprise data in grave danger.
β Medtronic cardiac implants can be hacked, FDA issues alert β
π Read
via "Naked Security".
Two serious flaws in the telemetry protocol could allow a hacker to control vulnerable Implantable Cardioverter Defibrillators (ICDs).π Read
via "Naked Security".
Naked Security
Medtronic cardiac implants can be hacked, FDA issues alert
Two serious flaws in the telemetry protocol could allow a hacker to control vulnerable Implantable Cardioverter Defibrillators (ICDs).