β New ratings point to keyless cars that can stand up to relay attacks β
π Read
via "Naked Security".
Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.π Read
via "Naked Security".
Naked Security
New ratings point to keyless cars that can stand up to relay attacks
Researchers rated six of the 11 newly launched cars as being easy to open up and drive off with a cheap relay device anyone can buy online.
β Update now! WordPress hackers target Easy WP SMTP plugin β
π Read
via "Naked Security".
Two hacking groups have been spotted targeting websites running unpatched versions of the WordPress plugin Easy WP SMTP.π Read
via "Naked Security".
β Thousands of API and cryptographic keys leaking on GitHub every day β
π Read
via "Naked Security".
Researchers have found that one of the most popular source code repositories in the world is still housing thousands of publicly accessible user credentials.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Hacking Cars For Fun and Profit at Pwn2Own π
π Read
via "Subscriber Blog RSS Feed ".
Web browsers, virtualization software, even cars β nothing was off guards last week at Pwn2Own, the annual hacking competition held each year alongside CanSecWest in Vancouver.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Hacking Cars For Fun and Profit at Pwn2Own
Web browsers, virtualization software, even cars β nothing was off guards last week at Pwn2Own, the annual hacking competition held each year alongside CanSecWest in Vancouver.
π Why site reliability engineers face more security incidents and higher stress levels π
π Read
via "Security on TechRepublic".
Half of SREs have worked on outages lasting longer than a day, according to a Catchpoint report.π Read
via "Security on TechRepublic".
TechRepublic
Why site reliability engineers face more security incidents and higher stress levels
Half of SREs have worked on outages lasting longer than a day, according to a Catchpoint report.
π Why 61% of CIOs believe employees maliciously leak data π
π Read
via "Security on TechRepublic".
One in five employees surveyed believes data belongs to them, not the company, according to an Opinion Matters / Egress report.π Read
via "Security on TechRepublic".
TechRepublic
Why 61% of CIOs believe employees maliciously leak data
One in five employees surveyed believes data belongs to them, not the company, according to an Opinion Matters / Egress report.
π How to stop remote workers from causing a security incident: 3 tips π
π Read
via "Security on TechRepublic".
Some 36% of organizations said they experience security breaches due to remote work, according to an OpenVPN report. Here's how to help.π Read
via "Security on TechRepublic".
TechRepublic
How to stop remote workers from causing a security incident: 3 tips
Some 36% of organizations said they experience security breaches due to remote work, according to an OpenVPN report. Here's how to help.
β FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors β
π Read
via "Threatpost".
The contractor with whom it shared the data has a vulnerable, unpatched network.π Read
via "Threatpost".
Threat Post
FEMA Exposes PII for Millions of Hurricane, Wildfire Survivors
The contractor with whom it shared the data has a vulnerable, unpatched network.
π΄ A Glass Ceiling? Not in Privacy π΄
π Read
via "Dark Reading: ".
According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%.π Read
via "Dark Reading: ".
Dark Reading
A Glass Ceiling? Not in Privacy
According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%.
π Top 5 business concerns about public cloud applications π
π Read
via "Security on TechRepublic".
Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 business concerns about public cloud applications
Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report.
π΄ Dark Reading's Kelly Jackson Higgins Honored as Top Cybersecurity Journalist π΄
π Read
via "Dark Reading: ".
In voting conducted by the SANS Institute, Jackson Higgins is named by peers as one of the top 10 journalists in the industry.π Read
via "Dark Reading: ".
Dark Reading
Dark Reading's Kelly Jackson Higgins Honored as Top Cybersecurity Journalist
In voting conducted by the SANS Institute, Jackson Higgins is named by peers as one of the top 10 journalists in the industry.
β Some ASUS Updates Drop Backdoors on PCs in βOperation ShadowHammerβ β
π Read
via "Threatpost".
The attack appears to be associated with a China-backed APT actor.π Read
via "Threatpost".
Threat Post
Some ASUS Updates Drop Backdoors on PCs in βOperation ShadowHammerβ
The attack appears to be associated with a China-backed APT actor.
π How to install OpenSSH on Windows 10 to encrypt network communications π
π Read
via "Security on TechRepublic".
Learn how to use SSH natively within Windows 10 to secure communications between network devices.π Read
via "Security on TechRepublic".
TechRepublic
How to install OpenSSH on Windows 10 to encrypt network communications
Learn how to use SSH natively within Windows 10 to secure communications between network devices.
β Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks β
π Read
via "Threatpost".
Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.π Read
via "Threatpost".
Threat Post
Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks
Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.
π΄ IT Leaders, Employees Divided on Data Security π΄
π Read
via "Dark Reading: ".
Execs and employees have dramatically different ideas of how much information is being lost and why - a gap that puts enterprise data in grave danger.π Read
via "Dark Reading: ".
Dark Reading
IT Leaders, Employees Divided on Data Security
Execs and employees have dramatically different ideas of how much information is being lost and why - a gap that puts enterprise data in grave danger.
β Medtronic cardiac implants can be hacked, FDA issues alert β
π Read
via "Naked Security".
Two serious flaws in the telemetry protocol could allow a hacker to control vulnerable Implantable Cardioverter Defibrillators (ICDs).π Read
via "Naked Security".
Naked Security
Medtronic cardiac implants can be hacked, FDA issues alert
Two serious flaws in the telemetry protocol could allow a hacker to control vulnerable Implantable Cardioverter Defibrillators (ICDs).
β Malware Payloads Hide in Images: Steganography Gets a Reboot β
π Read
via "Threatpost".
Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look.π Read
via "Threatpost".
Threat Post
Malware Payloads Hide in Images: Steganography Gets a Reboot
Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look.
ATENTIONβΌ New - CVE-2017-9376
π Read
via "National Vulnerability Database".
ManageEngine ServiceDesk Plus before 9314 contains a local file inclusion vulnerability in the defModule parameter in DefaultConfigDef.do and AssetDefaultConfigDef.do.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-9362
π Read
via "National Vulnerability Database".
ManageEngine ServiceDesk Plus before 9312 contains an XML injection at add Configuration items CMDB API.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-3954
π Read
via "National Vulnerability Database".
Hospira Plum A+ Infusion System version 13.4 and prior, Plum A+3 Infusion System version 13.6 and prior, and Symbiq Infusion System, version 3.13 and prior give unauthenticated users root privileges on Port 23/TELNET by default. An unauthorized user could issue commands to the pump. Hospira recommends that customers close Port 23/TELNET on the affected devices. Hospira has also released the Plum 360 Infusion System which is not vulnerable to this issue.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-3953
π Read
via "National Vulnerability Database".
Hard-coded accounts may be used to access Hospira Plum A+ Infusion System version 13.4 and prior, Plum A+3 Infusion System version 13.6 and prior, and Symbiq Infusion System, version 3.13 and prior. Hospira recommends that customers close Port 20/FTP and Port 23/TELNET on the affected devices. Hospira has also released the Plum 360 Infusion System which is not vulnerable to this issue.π Read
via "National Vulnerability Database".