β Mobile-First Phishing Kit Targets Verizon Customers β
π Read
via "Threatpost".
The kit's authors demonstrate a knowledge of Verizon's infrastructure.π Read
via "Threatpost".
Threat Post
Mobile-First Phishing Kit Targets Verizon Customers
The kit's authors demonstrate a knowledge of Verizon's infrastructure.
π΄ FireEye Creates Free Attack Toolset for Windows π΄
π Read
via "Dark Reading: ".
The security services company releases a distribution of 140 programs for penetration testers who need to launch attacks and tools from an instance of Windows.π Read
via "Dark Reading: ".
Dark Reading
FireEye Creates Free Attack Toolset for Windows
The security services company releases a distribution of 140 programs for penetration testers who need to launch attacks and tools from an instance of Windows.
π How a former Apple lead plans to make developers key to security solutions π
π Read
via "Security on TechRepublic".
Security has tended to be a bolt-on to enterprise software, but Sqreen hopes to make it part of the normal way developers work.π Read
via "Security on TechRepublic".
TechRepublic
How a former Apple lead plans to make developers key to security solutions
Security has tended to be a bolt-on to enterprise software, but Sqreen hopes to make it part of the normal way developers work.
π΄ War on Zero-Days: 4 Lessons from Recent Google & Microsoft Vulns π΄
π Read
via "Dark Reading: ".
When selecting targets, attackers often consider total cost of 'pwnership' -- the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy.π Read
via "Dark Reading: ".
Darkreading
War on Zero-Days: 4 Lessons from Recent Google & Microsoft Vulns
When selecting targets, attackers often consider total cost of 'pwnership' -- the expected cost of an operation versus the likelihood of success. Defenders need to follow a similar strategy.
π POS Malware Continues to Evolve, Infect Restaurants π
π Read
via "Subscriber Blog RSS Feed ".
The latest breach appears to have impacted at least two million credit card numbers across six restaurants, for 10 months.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
POS Malware Continues to Evolve, Infect Restaurants
The latest breach appears to have impacted at least two million credit card numbers across six restaurants, for 10 months.
π΄ Privacy & Regulatory Considerations in Enterprise Blockchain π΄
π Read
via "Dark Reading: ".
People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success.π Read
via "Dark Reading: ".
Darkreading
Privacy & Regulatory Considerations in Enterprise Blockchain
People who understand information governance, privacy, and security should be active participants on the distributed ledger technology implementation team to ensure success.
π΄ Women Now Hold One-Quarter of Cybersecurity Jobs π΄
π Read
via "Dark Reading: ".
New data from ISC(2) shows younger women are making more money than in previous generations in the field - but overall gender pay disparity persists.π Read
via "Dark Reading: ".
Dark Reading
Women Now Hold One-Quarter of Cybersecurity Jobs
New data from ISC(2) shows younger women are making more money than
in previous generations in the field - but overall gender pay disparity persists.
in previous generations in the field - but overall gender pay disparity persists.
β ThreatList: Half of All Attacks Aim at Supply Chain β
π Read
via "Threatpost".
Attackers these days want to βownβ your entire system, including partners and suppliers.π Read
via "Threatpost".
Threat Post
ThreatList: Half of All Attacks Aim at Supply Chain
Attackers these days want to βownβ your entire system, including partners and suppliers.
ATENTIONβΌ New - CVE-2017-6049
π Read
via "National Vulnerability Database".
Detcon Sitewatch Gateway, all versions without cellular, an attacker can edit settings on the device using a specially crafted URL.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-6047
π Read
via "National Vulnerability Database".
Detcon Sitewatch Gateway, all versions without cellular, Passwords are presented in plaintext in a file that is accessible without authentication.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18364 (phpfk)
π Read
via "National Vulnerability Database".
phpFK lite has XSS via the faq.php, members.php, or search.php query string or the user.php user parameter.π Read
via "National Vulnerability Database".
π΄ Major Mobile Financial Apps Harbor Built-in Vulnerabilities π΄
π Read
via "Dark Reading: ".
A wide variety of financial services companies' apps suffer from poor programing practices and unshielded data.π Read
via "Dark Reading: ".
Dark Reading
Application Security recent news | Dark Reading
Explore the latest news and expert commentary on Application Security, brought to you by the editors of Dark Reading
β Patch Android now! April updates fixes three critical flaws β
π Read
via "Naked Security".
Androidβs April update includes two critical CVE-level patches among a total of 11 affecting handsets running versions 7, 8, and 9.π Read
via "Naked Security".
Naked Security
Patch Android now! April updates fixes three critical flaws
Androidβs April update includes two critical CVE-level patches among a total of 11 affecting handsets running versions 7, 8, and 9.
β 2m credit cards ripped off from restaurant chain, sold on the dark web β
π Read
via "Naked Security".
PoS malware affected some Buca di Beppo, Earl of Sandwich, Planet Hollywood, Chicken Guy!, Mixology and Tequila Taqueria locations.π Read
via "Naked Security".
Sophos
2m credit cards ripped off from restaurant chain, sold on the dark web β Naked Security
PoS malware affected some Buca di Beppo, Earl of Sandwich, Planet Hollywood, Chicken Guy!, Mixology and Tequila Taqueria locations.
β Is your hard drive exposed online? β
π Read
via "Naked Security".
Over 13,500 internet-connected storage devices have been exposed online by users who didn't set passwords for them.π Read
via "Naked Security".
Naked Security
Is your hard drive exposed online?
Over 13,500 internet-connected storage devices have been exposed online by users who didnβt set passwords for them.
β Researchers trick Teslaβs Autopilot into driving into oncoming traffic β
π Read
via "Naked Security".
They placed unobtrusive stickers that drivers wouldn't see but would fool autopilot into thinking the lane was veering off to the left.π Read
via "Naked Security".
Naked Security
Researchers trick Teslaβs Autopilot into driving into oncoming traffic
They placed unobtrusive stickers that drivers wouldnβt see but would fool autopilot into thinking the lane was veering off to the left.
π Why insider security threats are on the rise and so difficult to detect π
π Read
via "Security on TechRepublic".
Some 73% of IT professionals said insider attacks have become more frequent in the past year, according to a Bitglass report.π Read
via "Security on TechRepublic".
TechRepublic
Why insider security threats are on the rise and so difficult to detect
Some 73% of IT professionals said insider attacks have become more frequent in the past year, according to a Bitglass report.
π Why businesses are at risk over poor data privacy practices π
π Read
via "Security on TechRepublic".
Multiple data sources, data sharing agreements, and data inventory are some of the challenges of managing data privacy cited in a survey from Integris Software.π Read
via "Security on TechRepublic".
TechRepublic
Why businesses are at risk over poor data privacy practices
Multiple data sources, data sharing agreements, and data inventory are some of the challenges of managing data privacy cited in a survey from Integris Software.
π΄ 6 Essential Skills Cybersecurity Pros Need to Develop in 2019 π΄
π Read
via "Dark Reading: ".
In a time of disruption in the security and tech worlds, cybersecurity professionals can't afford to become complacent - even in the face of a skills shortage.π Read
via "Dark Reading: ".
Dark Reading
6 Essential Skills Cybersecurity Pros Need to Develop in 2019
In a time of disruption in the security and tech worlds, cybersecurity professionals can't afford to become complacent - even in the face of a skills shortage.
π΄ Financial Firms Scrutinize Third-Party Supplier Risk π΄
π Read
via "Dark Reading: ".
But executives aren't confident in the accuracy of cybersecurity assessment data received from their vendors, a new study shows.π Read
via "Dark Reading: ".
Dark Reading
Financial Firms Scrutinize Third-Party Supplier Risk
But executives aren't confident in the accuracy of cybersecurity assessment data received from their vendors, a new study shows.
π΄ Aqua Security Closes $62M in Funding π΄
π Read
via "Dark Reading: ".
Aqua Security Closes $62M in Fundingπ Read
via "Dark Reading: ".
Dark Reading
Aqua Security Closes $62M in Funding