π΄ Third Parties in Spotlight as More Facebook Data Leaks π΄
π Read
via "Dark Reading: ".
Two third-party services left Facebook user data exposed online -- in one case, 540 million records of user comments -- highlighting the ease with which third-party developers can access data and the risk of lax security.π Read
via "Dark Reading: ".
Darkreading
Third Parties in Spotlight as More Facebook Data Leaks
Two third-party services left Facebook user data exposed online -- in one case, 540 million records of user comments -- highlighting the ease with which third-party developers can access data and the risk of lax security.
π΄ Threat Group Employs Amazon-Style Fulfillment Model to Distribute Malware π΄
π Read
via "Dark Reading: ".
The operators of the Necurs botnet are using a collection of US-based servers to send out banking Trojans, ransomware, and other malware on behalf of other cybercriminals.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ Python-Based Bot Scanner Gorging on Recon Intel π΄
π Read
via "Dark Reading: ".
Discovered by AT&T AlienLabs, new malware Xwo seeking default creds and misconfigurations in MySQL and MongoDB, among other servicesπ Read
via "Dark Reading: ".
Darkreading
Python-Based Bot Scanner Gorging on Recon Intel
Discovered by AT&T Alien Labs, new malware Xwo seeking default creds and misconfigurations in MySQL and MongoDB, among other services
β New law will punish social media companies for usersβ violent content β
π Read
via "Naked Security".
Australian law makers have responded very quickly to the Christchurch shootings.π Read
via "Naked Security".
Naked Security
New law will punish social media companies for usersβ violent content
Australian law makers have responded very quickly to the Christchurch shootings.
β Nvidia patches severe bugs in edge computing modules β
π Read
via "Naked Security".
Nvidia has released 13 patches targeting two low-end embedded computing boards.π Read
via "Naked Security".
Naked Security
Nvidia patches severe bugs in edge computing modules
Nvidia has released 13 patches targeting two low-end embedded computing boards.
β Hoax! Nope, hackers arenβt posting invisible sexual videos on your wall β
π Read
via "Naked Security".
A Facebook hoax from 2011 is doing the rounds again. Don't fall for it, do something useful instead.π Read
via "Naked Security".
Naked Security
Hoax! Nope, hackers arenβt posting invisible sexual videos on your wall
A Facebook hoax from 2011 is doing the rounds again. Donβt fall for it, do something useful instead.
π How to enable two-factor authentication for SSH in Fedora Linux π
π Read
via "Security on TechRepublic".
Any machine that allows SSH login would benefit from the addition of two-factor authentication.π Read
via "Security on TechRepublic".
TechRepublic
How to enable two-factor authentication for SSH in Fedora Linux
Any machine that allows SSH login would benefit from the addition of two-factor authentication.
π How to avoid document-based malware attacks π
π Read
via "Security on TechRepublic".
Some 59% of all malicious files detected in the first quarter of 2019 were documents, according to a Barracuda Networks report. Here's how to protect yourself against this growing threat.π Read
via "Security on TechRepublic".
TechRepublic
How to avoid document-based malware attacks
Some 59% of all malicious files detected in the first quarter of 2019 were documents, according to a Barracuda Networks report. Here's how to protect yourself against this growing threat.
π Half of online banks allow hackers to steal your money π
π Read
via "Security on TechRepublic".
All online banks risk giving attackers unauthorized access to personal data, funds, and sensitive information, according to Positive Technologies.π Read
via "Security on TechRepublic".
TechRepublic
Half of online banks allow hackers to steal your money
All online banks risk giving attackers unauthorized access to personal data, funds, and sensitive information, according to Positive Technologies.
β Patch now! Magento e-commerce sites targeted by SQLi attacks β
π Read
via "Naked Security".
If you're a Magento admin, stop what youβre doing and patch now.π Read
via "Naked Security".
Naked Security
Patch now! Magento e-commerce sites targeted by SQLi attacks
If youβre a Magento admin, stop what youβre doing and patch now.
β LokiBot Trojan Spotted Hitching a Ride Inside .PNG Files β
π Read
via "Threatpost".
Spam campaign features obfuscated .zipx archive that unpacks LokiBot attack.π Read
via "Threatpost".
Threat Post
LokiBot Trojan Spotted Hitching a Ride Inside .PNG Files
Spam campaign features obfuscated .zipx archive that unpacks LokiBot attack.
β Hackers Abuse Google Cloud Platform to Attack D-Link Routers β
π Read
via "Threatpost".
Three waves of DNS hijacking attacks against consumer routers have been linked back to Google Cloud Platform abuse.π Read
via "Threatpost".
Threat Post
Hackers Abuse Google Cloud Platform to Attack D-Link Routers
Three waves of DNS hijacking attacks against consumer routers have been linked back to Google Cloud Platform abuse.
π΄ The Matrix at 20: A Metaphor for Today's Cybersecurity Challenges π΄
π Read
via "Dark Reading: ".
The Matrix ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too familiar to security pros.π Read
via "Dark Reading: ".
Darkreading
The Matrix at 20: A Metaphor for Today's Cybersecurity Challenges
<i>The Matrix</i> ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too familiar to security pros.
β Serious Security: GPS week rollover and the other sort of βzero dayβ β
π Read
via "Naked Security".
Tomorrow night, the GPS "earth clock" has a Y2K event - but here's why you should be OK.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Facebook Boots 74 Cybercrime Groups From Platform β
π Read
via "Threatpost".
The 74 cybercrime groups were offering illicit services - from email spamming tools to stolen credentials - right on Facebook's platform.π Read
via "Threatpost".
Threat Post
Facebook Boots 74 Cybercrime Groups From Platform
The 74 cybercrime groups were offering illicit services - from email spamming tools to stolen credentials - right on Facebook's platform.
π Friday Five: 4/5 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Employee theft at SMBs, fighting stalkerware, and a "hacker-proof" new cryptographic library - catch up on the week's infosec news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 4/5 Edition
Employee theft at SMBs, fighting stalkerware, and a "hacker-proof" new cryptographic library - catch up on the week's infosec news with this roundup!
π΄ Advanced Persistent Threat: Dark Reading Caption Contest Winners π΄
π Read
via "Dark Reading: ".
From sushi and phishing to robots, passwords and ninjas -- and the winners are ...π Read
via "Dark Reading: ".
Darkreading
Advanced Persistent Threat: Dark Reading Caption Contest Winners
From sushi and phishing to robots, passwords and ninjas -- and the winners are ...
π΄ Ongoing DNS Hijack Attack Hits Consumer Modems and Routers π΄
π Read
via "Dark Reading: ".
The attack campaigns have re-routed DNS requests through illicit servers in Canada and Russia.π Read
via "Dark Reading: ".
Darkreading
Ongoing DNS Hijack Attack Hits Consumer Modems and Routers
The attack campaigns have re-routed DNS requests through illicit servers in Canada and Russia.
π How to completely and securely delete files in Windows π
π Read
via "Security on TechRepublic".
To make sure a deleted file can't be recovered, you'll need to use a third-party shredding tool. Here's a look at three such free programs: Eraser, File Shredder, and Freeraser.π Read
via "Security on TechRepublic".
TechRepublic
How to completely and securely delete files in Windows | TechRepublic
To make sure a deleted file can't be recovered, you'll need to use a third-party shredding tool. Here's a look at three such free programs: Eraser, File Shredder, and Freeraser.
π΄ Phishing Campaign Targeting Verizon Mobile Users π΄
π Read
via "Dark Reading: ".
Lookout Phishing AI, which discovered the attack, says it has been going on since late November.π Read
via "Dark Reading: ".
Darkreading
Phishing Campaign Targeting Verizon Mobile Users
Lookout Phishing AI, which discovered the attack, says it has been going on since late November.
β Cisco Finally Patches Routers Bugs As New Unpatched Flaws Surface β
π Read
via "Threatpost".
Cisco repatched its RV320 and RV325 routers against two high-severity vulnerabilities, but at the same time reported two new medium-severity bugs with no fixes.π Read
via "Threatpost".
Threat Post
Cisco Finally Patches Router Bugs As New Unpatched Flaws Surface
Cisco re-patched its RV320 and RV325 routers to protect against two high-severity vulnerabilities at the same time reported two new mediums-severity bugs with no fixes.