β DragonEx exchange hacked, smoking ashes being raked over β
π Read
via "Naked Security".
βPartβ of its assets have been retrieved, and they've got an address for a suddenly much plumper Bittrex wallet.π Read
via "Naked Security".
Naked Security
DragonEx exchange hacked, smoking ashes being raked over
βPartβ of its assets have been retrieved, and theyβve got an address for a suddenly much plumper Bittrex wallet.
β Preinstalled Android apps are harvesting and sharing your data β
π Read
via "Naked Security".
New research reveals that the bloatware preinstalled on many new Android phones could do far more than simply chew up your storage.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Ransomware Behind Norsk Hydro Attack Takes On Wiper-Like Capabilities β
π Read
via "Threatpost".
Researchers are still looking for answers when it comes to LockerGoga's initial infection method - and what the attackers behind the ransomware really want.π Read
via "Threatpost".
Threat Post
Ransomware Behind Norsk Hydro Attack Takes On Wiper-Like Capabilities
Researchers are still looking for answers when it comes to LockerGoga's initial infection method - and what the attackers behind the ransomware really want.
π 6 things keeping IoT pros up at night π
π Read
via "Security on TechRepublic".
Implementation and security are the top concerns among professionals involved in the Internet of Things, according to a survey from the organizers of IoT World 2019.π Read
via "Security on TechRepublic".
TechRepublic
6 things keeping IoT pros up at night
Implementation and security are the top concerns among professionals involved in the Internet of Things, according to a survey from the organizers of IoT World 2019.
π 3 security threats businesses need to prepare for by 2021 π
π Read
via "Security on TechRepublic".
IoT and digital transformation efforts will leave more businesses vulnerable to cyberattack, according to Information Security Forum.π Read
via "Security on TechRepublic".
TechRepublic
3 security threats businesses need to prepare for by 2021
IoT and digital transformation efforts will leave more businesses vulnerable to cyberattack, according to Information Security Forum.
β Facebookβs Whitehat Settings lets bug-hunters dial back app security β
π Read
via "Naked Security".
The "Whitehat" settings will help researchers to analyze network traffic from its mobile apps by dialling back security settings.π Read
via "Naked Security".
Naked Security
Facebookβs Whitehat Settings lets bug-hunters dial back app security
The βWhitehatβ settings will help researchers to analyze network traffic from its mobile apps by dialling back security settings.
π΄ The 'Twitterverse' Is Not the Security Community π΄
π Read
via "Dark Reading: ".
The drama on social media belies the incredible role models, job, training, and networking opportunities found in the real world of traditional cybersecurity.π Read
via "Dark Reading: ".
Dark Reading
The 'Twitterverse' Is Not the Security Community
The drama on social media belies the incredible role models, job, training, and networking opportunities found in the real world of traditional cybersecurity.
β Ep. 025 β Business Email Compromise and IoT surprises [PODCAST] β
π Read
via "Naked Security".
Here's our latest podcast - listen now!π Read
via "Naked Security".
Naked Security
Ep. 025 β Business Email Compromise and IoT surprises [PODCAST]
Hereβs our latest podcast β listen now!
β Cybercriminals Have a Heyday with WinRAR Bug in Fresh Campaigns β
π Read
via "Threatpost".
With new attacks on the Israeli military and social-work educators, exploitation of the 19-year-old flaw shows no signs of slowing down.π Read
via "Threatpost".
Threat Post
Cybercriminals Have a Heyday with WinRAR Bug in Fresh Campaigns
With new attacks on the Israeli military and social-work educators, exploitation of the 19-year-old flaw shows no signs of slowing down.
β Gamers Beware: Nvidia Fixes High-Severity GeForce Experience Bug β
π Read
via "Threatpost".
Versions of GeForce Experience for Windows before 3.18 are open to a bug that can allow denial of service and remote code execution.π Read
via "Threatpost".
Threat Post
Gamers Beware: Nvidia Fixes High-Severity GeForce Experience Bug
Versions of GeForce Experience for Windows before 3.18 are open to a bug that can allow denial of service and remote code execution.
π΄ GAO Finds Deficiencies in Systems for Handling National Debt π΄
π Read
via "Dark Reading: ".
IT systems at the Bureau of the Fiscal Service and the Federal Reserve Bank show vulnerabilities that could lead them open to exploitation and breach.π Read
via "Dark Reading: ".
Dark Reading
GAO Finds Deficiencies in Systems for Handling National Debt
IT systems at the Bureau of the Fiscal Service and the Federal Reserve Bank show vulnerabilities that could lead them open to exploitation and breach.
β Grindr Poses National Security Risk, U.S. Gov Says β
π Read
via "Threatpost".
According to a report, Grindr's Chinese owners are selling the platform after concerns were raised about user data handling.π Read
via "Threatpost".
Threat Post
Grindr Poses National Security Risk, U.S. Gov Says
According to a report, Grindr's Chinese owners are selling the platform after concerns were raised about user data handling.
ATENTIONβΌ New - CVE-2017-2752
π Read
via "National Vulnerability Database".
A potential security vulnerability caused by incomplete obfuscation of application configuration information was discovered in Tommy Hilfiger TH24/7 Android app versions 2.0.0.11, 2.0.1.14, 2.1.0.16, and 2.2.0.19. HP has no access to customer data as a result of this issue.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-2748
π Read
via "National Vulnerability Database".
A potential security vulnerability caused by the use of insecure (http) transactions during login has been identified with early versions of the Isaac Mizrahi Smartwatch mobile app. HP has no access to customer data as a result of this issue.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18364
π Read
via "National Vulnerability Database".
phpFK lite has XSS via the faq.php, members.php, or search.php query string or the user.php user parameter.π Read
via "National Vulnerability Database".
π΄ Threat Hunting 101: Not Mission Impossible for the Resource-Challenged π΄
π Read
via "Dark Reading: ".
How small and medium-sized businesses can leverage native features of the operating system and freely available, high-quality hunting resources to overcome financial limitations.π Read
via "Dark Reading: ".
Darkreading
Threat Hunting 101: Not Mission Impossible for the Resource-Challenged
How small and medium-sized businesses can leverage native features of the operating system and freely available, high-quality hunting resources to overcome financial limitations.
π Breaking Down Singapore's New Data Protection Trustmark Certification π
π Read
via "Subscriber Blog RSS Feed ".
A new certification, launched by a division of the country's government this week, is designed to help organizations demonstrate "accountable and responsible data protection practices."π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Breaking Down Singapore's New Data Protection Trustmark Certification
A new certification, launched by a division of the country's government this week, is designed to help organizations demonstrate "accountable and responsible data protection practices."
π΄ 87% of Cloud Pros Say Visibility Masks Security π΄
π Read
via "Dark Reading: ".
The majority of cloud IT professionals find a direct link between network visibility and business value, new data shows.π Read
via "Dark Reading: ".
Dark Reading
87% of Cloud Pros Say Lack of Visibility Masks Security
The majority of cloud IT professionals find a direct link between network visibility and business value, new data shows.
ATENTIONβΌ New - CVE-2016-9166 (netiq_edirectory)
π Read
via "National Vulnerability Database".
NetIQ eDirectory versions prior to 9.0.2, under some circumstances, could be susceptible to downgrade of communication security.π Read
via "National Vulnerability Database".
π΄ New Shodan Tool Warns Organizations of Their Internet-Exposed Devices π΄
π Read
via "Dark Reading: ".
Shodan Monitor is free to members of the popular Internet search engine.π Read
via "Dark Reading: ".
Dark Reading
New Shodan Tool Warns Organizations of Their Internet-Exposed Devices
Shodan Monitor is free to members of the popular Internet search engine.
β FTC Demands Broadband Providers Reveal Data Handling Practices β
π Read
via "Threatpost".
The FTC is ordering seven companies - including AT&T, T-Mobile, Comcast and more - to outline what data they collect, what they use the data for, and how transparent they're being with consumers.π Read
via "Threatpost".
Threat Post
FTC Demands Broadband Providers Reveal Data Handling Practices
The FTC is ordering seven companies - including AT&T, T-Mobile, Comcast and more - to outline what data they collect, what they use the data for, and how transparent they're being with consumers.