β Possible Toyota data breach affecting 3.1 million customers β
π Read
via "Naked Security".
Several Toyota companies have announced that they might have suffered data breach attempts, with one affecting 3.1 million customers.π Read
via "Naked Security".
Naked Security
Possible Toyota data breach affecting 3.1 million customers
Several Toyota companies have announced that they might have suffered data breach attempts, with one affecting 3.1 million customers.
β Financial Apps are Ripe for Exploit via Reverse Engineering β
π Read
via "Threatpost".
White hat hacker reverse engineers financial apps and finds a treasure trove of security issues.π Read
via "Threatpost".
Threat Post
Financial Apps are Ripe for Exploit via Reverse Engineering
White hat hacker reverse engineers financial apps and finds a treasure trove of security issues.
β VMware patches critical vulnerabilities β
π Read
via "Naked Security".
VMware has released patches for several critical security vulnerabilities, days after two were unveiled at Pwn2Own.π Read
via "Naked Security".
Naked Security
VMware patches critical vulnerabilities
VMware has released patches for several critical security vulnerabilities, days after two were unveiled at Pwn2Own.
β Are there viable alternatives to Facebook and Twitter? β
π Read
via "Naked Security".
There's growing interest in social networks that prioritize user control. Two of the popular ones are Mastodon and Diaspora.π Read
via "Naked Security".
Naked Security
Are there viable alternatives to Facebook and Twitter?
Thereβs growing interest in social networks that prioritize user control. Two of the popular ones are Mastodon and Diaspora.
β TP-Link router zero-day that offers your network up to hackers β
π Read
via "Naked Security".
Downgrade attack lets any user take over - just ask for old-style access to the debugging port and you won't need a passwordπ Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Rapid7 Buys Network Monitoring Firm NetFort π΄
π Read
via "Dark Reading: ".
New technology will be integrated into Rapid7's cloud-based security analytics platform.π Read
via "Dark Reading: ".
Dark Reading
Rapid7 Buys Network Monitoring Firm NetFort
New technology will be integrated into Rapid7's cloud-based security analytics platform.
π How financial institutions are risking customer data through insecure mobile apps π
π Read
via "Security on TechRepublic".
An investigation of mobile apps from 30 financial institutions reveals weak encryption, data leakage, insecure data storage, and other vulnerabilities.π Read
via "Security on TechRepublic".
TechRepublic
How financial institutions are risking customer data through insecure mobile apps
An investigation of mobile apps from 30 financial institutions reveals weak encryption, data leakage, insecure data storage, and other vulnerabilities.
π Why women still make up only 24% of cybersecurity pros π
π Read
via "Security on TechRepublic".
More millennial women are entering the field, but wage gap issues remain, according to an (ISC)Β² report.π Read
via "Security on TechRepublic".
TechRepublic
Why women still make up only 24% of cybersecurity pros
More millennial women are entering the field, but wage gap issues remain, according to an (ISC)Β² report.
β Government spyware hidden in Google Play store apps β
π Read
via "Naked Security".
The malware, dubbed Exodus, records and steals all manner of data and leaves phones vulnerable to further hacking and data tampering.π Read
via "Naked Security".
Naked Security
Government spyware hidden in Google Play store apps
The malware, dubbed Exodus, records and steals all manner of data and leaves phones vulnerable to further hacking and data tampering.
π΄ Airports & Operational Technology: 4 Attack Scenarios π΄
π Read
via "Dark Reading: ".
As OT systems increasingly fall into the crosshairs of cyberattackers, aviation-industry CISOs have become hyper-focused on securing them.π Read
via "Dark Reading: ".
Darkreading
Airports & Operational Technology: 4 Attack Scenarios
As OT systems increasingly fall into the crosshairs of cyberattackers, aviation-industry CISOs have become hyper-focused on securing them.
π΄ Sentence Handed Down in $4.2 Million BEC Scheme π΄
π Read
via "Dark Reading: ".
Maryland man conspired in a business email compromise scheme that stole from at least 13 separate victims over the course of a year.π Read
via "Dark Reading: ".
Dark Reading
Sentence Handed Down in $4.2 Million BEC Scheme
Maryland man conspired in a business email compromise scheme that stole from at least 13 separate victims over the course of a year.
π How companies are dealing with the security threats of an evolving remote workforce π
π Read
via "Security on TechRepublic".
Multi-factor authentication is a common strategy, while Zero Trust is gaining traction, according to an Okta report.π Read
via "Security on TechRepublic".
TechRepublic
How companies are dealing with the security threats of an evolving remote workforce
Multi-factor authentication is a common strategy, while Zero Trust is gaining traction, according to an Okta report.
π Assessing third-party vendor risk: Top 6 challenges π
π Read
via "Security on TechRepublic".
Third-party cyber threats are impacting major business decisions, according to a BitSight and CeFPro report. Here are some of the biggest challenges.π Read
via "Security on TechRepublic".
TechRepublic
Assessing third-party vendor risk: Top 6 challenges
Third-party cyber threats are impacting major business decisions, according to a BitSight and CeFPro report. Here are some of the biggest challenges.
β Googleβs April Android Security Bulletin Warns of 3 Critical Bugs β
π Read
via "Threatpost".
Google's April Android Security update fixed 12 Android-specific vulnerabilities including three critical remote code execution flaws.π Read
via "Threatpost".
Threat Post
Googleβs April Android Security Bulletin Warns of 3 Critical Bugs
Google's April Android Security update fixed 12 Android-specific vulnerabilities including three critical remote code execution flaws.
β Mobile-First Phishing Kit Targets Verizon Customers β
π Read
via "Threatpost".
The kit's authors demonstrate a knowledge of Verizon's infrastructure.π Read
via "Threatpost".
Threat Post
Mobile-First Phishing Kit Targets Verizon Customers
The kit's authors demonstrate a knowledge of Verizon's infrastructure.
π΄ FireEye Creates Free Attack Toolset for Windows π΄
π Read
via "Dark Reading: ".
The security services company releases a distribution of 140 programs for penetration testers who need to launch attacks and tools from an instance of Windows.π Read
via "Dark Reading: ".
Dark Reading
FireEye Creates Free Attack Toolset for Windows
The security services company releases a distribution of 140 programs for penetration testers who need to launch attacks and tools from an instance of Windows.
π How a former Apple lead plans to make developers key to security solutions π
π Read
via "Security on TechRepublic".
Security has tended to be a bolt-on to enterprise software, but Sqreen hopes to make it part of the normal way developers work.π Read
via "Security on TechRepublic".
TechRepublic
How a former Apple lead plans to make developers key to security solutions
Security has tended to be a bolt-on to enterprise software, but Sqreen hopes to make it part of the normal way developers work.
π΄ War on Zero-Days: 4 Lessons from Recent Google & Microsoft Vulns π΄
π Read
via "Dark Reading: ".
When selecting targets, attackers often consider total cost of 'pwnership' -- the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy.π Read
via "Dark Reading: ".
Darkreading
War on Zero-Days: 4 Lessons from Recent Google & Microsoft Vulns
When selecting targets, attackers often consider total cost of 'pwnership' -- the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy.
π POS Malware Continues to Evolve, Infect Restaurants π
π Read
via "Subscriber Blog RSS Feed ".
The latest breach appears to have impacted at least two million credit card numbers across six restaurants, for 10 months.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
POS Malware Continues to Evolve, Infect Restaurants
The latest breach appears to have impacted at least two million credit card numbers across six restaurants, for 10 months.
π΄ Privacy & Regulatory Considerations in Enterprise Blockchain π΄
π Read
via "Dark Reading: ".
People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success.π Read
via "Dark Reading: ".
Darkreading
Privacy & Regulatory Considerations in Enterprise Blockchain
People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success.
π΄ Women Now Hold One-Quarter of Cybersecurity Jobs π΄
π Read
via "Dark Reading: ".
New data from ISC(2) shows younger women are making more money than in previous generations in the field - but overall gender pay disparity persists.π Read
via "Dark Reading: ".
Dark Reading
Women Now Hold One-Quarter of Cybersecurity Jobs
New data from ISC(2) shows younger women are making more money than
in previous generations in the field - but overall gender pay disparity persists.
in previous generations in the field - but overall gender pay disparity persists.