π’ IOC defends China Olympics app after 'devastating flaw' revealed π’
π Read
via "ITPro".
The app may even be breaking Google and Appleβs app store policies when it comes to privacy, according to Citizen Labπ Read
via "ITPro".
IT PRO
IOC defends China Olympics app after 'devastating flaw' revealed | IT PRO
The app may even be breaking Google and Appleβs app store policies when it comes to privacy, according to Citizen Lab
π’ NCA plots education drive to crack down on children exploring cyber crime π’
π Read
via "ITPro".
With children as young as nine being referred to the NCA for launching DDoS attacks, the new campaign aims to educate children in the consequences of cyber crimeπ Read
via "ITPro".
IT PRO
NCA plots education drive to crack down on children exploring cyber crime | IT PRO
With children as young as nine being referred to the NCA for launching DDoS attacks, the new campaign aims to educate children in the consequences of cyber crime
π’ A month in the life of a social engineer - part three π’
π Read
via "ITPro".
With the master plan now well underway, we learn how the hacker exploits their target's βunpatchableβ human flaws to gain access to corporate systemsπ Read
via "ITPro".
IT PRO
A month in the life of a social engineer - part three | IT PRO
With the master plan now well underway, we learn how the hacker exploits their target's βunpatchableβ human flaws to gain access to corporate systems
π’ Skills 'deficit' forces Student Loans Company to spend heavily on temp staff π’
π Read
via "ITPro".
The organisation has spent Β£2.6 million on agency staff as it struggles to retain technical employeesπ Read
via "ITPro".
IT PRO
Skills 'deficit' forces Student Loans Company to spend heavily on temp staff | IT PRO
The organisation has spent Β£2.6 million on agency staff as it struggles to retain technical employees
π’ Microsoft warns full scope of Ukraine cyber attacks βnot fully realisedβ π’
π Read
via "ITPro".
The company's investigation into the attacks targeting Ukraine revealed atypical characteristics of the "destructive" campaign that disguises itself as ransomwareπ Read
via "ITPro".
ITPro
Microsoft warns full scope of Ukraine cyber attacks βnot fully realisedβ
The company's investigation into the attacks targeting Ukraine revealed atypical characteristics of the "destructive" campaign that disguises itself as ransomware
π’ The UK's IoT proposals are riddled with βastonishingβ gaps π’
π Read
via "ITPro".
The Product Security and Telecommunications Infrastructure (PTSI) Bill aims to address the connected devices security nightmare, but experts agree it doesnβt go far enoughπ Read
via "ITPro".
IT PRO
The UK's IoT proposals are riddled with βastonishingβ gaps | IT PRO
The Product Security and Telecommunications Infrastructure (PTSI) Bill aims to address the connected devices security nightmare, but experts agree it doesnβt go far enough
π’ Windows Server admins agree to forgo broken patches π’
π Read
via "ITPro".
Many administrators have agreed to wait until February's round of patches to avoid operational disruption caused by broken fixesπ Read
via "ITPro".
ITPro
Windows Server admins agree to forgo broken patches
Many administrators have agreed to wait until February's round of patches to avoid operational disruption caused by broken fixes
π’ Russia's "politically motivated" REvil raid could be used as leverage, experts warn π’
π Read
via "ITPro".
The cyber security industry says the FSB's arrests are βunlikelyβ to signal a change in Russiaβs policyπ Read
via "ITPro".
IT PRO
Russia's "politically motivated" REvil raid could be used as leverage, experts warn | IT PRO
The cyber security industry says the FSB's arrests are βunlikelyβ to signal a change in Russiaβs policy
π’ FireEye and McAfee Enterprise relaunch as Trellix π’
π Read
via "ITPro".
The new pure-play cyber security firmβs platform combines automation, machine learning, and threat intelligenceπ Read
via "ITPro".
IT PRO
FireEye and McAfee Enterprise relaunch as Trellix | IT PRO
The new pure-play cyber security firmβs platform combines automation, machine learning, and threat intelligence
π’ White House issues memorandum to bolster national security systems π’
π Read
via "ITPro".
Agencies must now implement multi-factor authentication within 180 days, along with encryption for data at rest and in transitπ Read
via "ITPro".
IT PRO
White House issues memorandum to bolster national security systems | IT PRO
Agencies must now implement multi-factor authentication within 180 days, along with encryption for data at rest and in transit
π’ Red Cross "appalled" by data breach targeting 515,000 vulnerable people π’
π Read
via "ITPro".
The charitable organisation has begged cyber attackers not to leak the data online in emotional pleaπ Read
via "ITPro".
IT PRO
Red Cross "appalled" by data breach targeting 515,000 vulnerable people | IT PRO
The charitable organisation has begged cyber attackers not to leak the data online in emotional plea
π’ DHL overtakes Microsoft as the most imitated brand in phishing attacks π’
π Read
via "ITPro".
Check Point Research reveals that the logistics giant accounted for almost a quarter of global phishing attacks in 2021π Read
via "ITPro".
ITPro
DHL overtakes Microsoft as the most imitated brand in phishing attacks
Check Point Research reveals that the logistics giant accounted for almost a quarter of global phishing attacks in 2021
π’ UK and Australia partner on cyber security investment π’
π Read
via "ITPro".
The countries are set to invest in infrastructure for Indo-Pacific states as well, in the areas of energy, investment, and technologyπ Read
via "ITPro".
IT PRO
UK and Australia partner on cyber security investment | IT PRO
The countries are set to invest in infrastructure for Indo-Pacific states as well, in the areas of energy, investment, and technology
π’ Ransomware: Why only the bravest businesses will survive π’
π Read
via "ITPro".
With ransomware attacks a matter of when, not if, the secret to protecting your reputation lies in honesty and transparencyπ Read
via "ITPro".
IT PRO
Ransomware: Why only the bravest businesses will survive | IT PRO
With ransomware attacks a matter of when, not if, the secret to protecting your reputation lies in honesty and transparency
π’ NordVPN launches open source VPN speed testing tool π’
π Read
via "ITPro".
The unified speed-testing software can be downloaded from GitHubπ Read
via "ITPro".
IT PRO
NordVPN launches open source VPN speed testing tool | IT PRO
The unified speed-testing software can be downloaded from GitHub
π’ The governmentβs anti-encryption campaign shows itβs learned nothing from the war on drugs π’
π Read
via "ITPro".
Criminalisation has almost always backfired through history, pushing illicit materials further into the hands of criminalsπ Read
via "ITPro".
IT PRO
The governmentβs anti-encryption campaign shows itβs learned nothing from the war on drugs | IT PRO
Criminalisation has almost always backfired through history, pushing illicit materials further into the hands of criminals
βΌ CVE-2022-21933 βΌ
π Read
via "National Vulnerability Database".
ASUS VivoMini/Mini PC device has an improper input validation vulnerability. A local attacker with system privilege can use system management interrupt (SMI) to modify memory, resulting in arbitrary code execution for controlling the system or disrupting service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0326 βΌ
π Read
via "National Vulnerability Database".
NULL Pointer Dereference in Homebrew mruby prior to 3.2.π Read
via "National Vulnerability Database".
ποΈ BitLocker encryption: Clear text key storage prompts security debate online ποΈ
π Read
via "The Daily Swig".
Many are questioning why keys are saved in the clear ahead of sign-inπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
BitLocker encryption: Clear text key storage prompts security debate online
Many are questioning why keys are saved in the clear ahead of sign-in
βΌ CVE-2022-0318 βΌ
π Read
via "National Vulnerability Database".
Heap-based Buffer Overflow in Conda vim prior to 8.2.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0329 βΌ
π Read
via "National Vulnerability Database".
Code Injection in Conda loguru prior to master.π Read
via "National Vulnerability Database".