π Vulnerabilities discovered in industrial equipment increased 30% in 2018 π
π Read
via "Security on TechRepublic".
As state-sponsored attackers increase their activity and cyberwar escalates, security researchers are focusing their attention on industrial systems to surface vulnerabilities.π Read
via "Security on TechRepublic".
TechRepublic
Vulnerabilities discovered in industrial equipment increased 30% in 2018
As state-sponsored attackers increase their activity and cyberwar escalates, security researchers are focusing their attention on industrial systems to surface vulnerabilities.
π Top 5 emerging risks businesses face π
π Read
via "Security on TechRepublic".
With the onset of GDPR, privacy regulation compliance now tops talent shortages as the largest emerging business risk, according to Gartner.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 emerging risks businesses face
With the onset of GDPR, privacy regulation compliance now tops talent shortages as the largest emerging business risk, according to Gartner.
β ThreatList: Tax Scammers Launch a Raft of Fake Mobile Apps β
π Read
via "Threatpost".
Convincing phishing pages and millions of suspicious apps are plaguing tax season.π Read
via "Threatpost".
Threat Post
ThreatList: Tax Scammers Launch a Raft of Fake Mobile Apps
Convincing phishing pages and millions of suspicious apps are plaguing tax season.
β WordPress Yellow Pencil Plugin Flaws Actively Exploited β
π Read
via "Threatpost".
Yet another Wordpress plugin, Yellow Pencil Visual Theme Customizer, is being exploited in the wild after two software vulnerabilities were discovered.π Read
via "Threatpost".
Threat Post
WordPress Yellow Pencil Plugin Flaws Actively Exploited
Yet another WordPress plugin, Yellow Pencil Visual Theme Customizer, is being exploited in the wild after two software vulnerabilities were discovered.
π΄ Cloudy with a Chance of Security Breach π΄
π Read
via "Dark Reading: ".
Businesses must be aware of the security weaknesses of the public cloud and not assume that every angle is covered.π Read
via "Dark Reading: ".
Darkreading
Cloudy with a Chance of Security Breach
Businesses must be aware of the security weaknesses of the public cloud and not assume that every angle is covered.
π΄ Home Office Apologizes for EU Citizen Data Exposure π΄
π Read
via "Dark Reading: ".
The Home Office has admitted to compromising private email addresses belonging to EU citizens hoping to settle in the UK.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β North Koreaβs Hidden Cobra Strikes U.S. Targets with HOPLIGHT β
π Read
via "Threatpost".
The custom malware is a spy tool and can also disrupt processes at U.S. assets.π Read
via "Threatpost".
Threat Post
North Koreaβs Hidden Cobra Strikes U.S. Targets with HOPLIGHT
The custom malware is a spy tool and can also disrupt processes at U.S. assets.
π΄ 8 'SOC-as-a-Service' Offerings π΄
π Read
via "Dark Reading: ".
These new cloud services seek to help companies figure out what their traditional SIEM alerts mean, plus how they can prioritize responses and improve their security operations.π Read
via "Dark Reading: ".
Dark Reading
8 'SOC-as-a-Service' Offerings
These new cloud services seek to help companies figure out what their traditional SIEM alerts mean, plus how they can prioritize responses and improve their security operations.
β Romanian Duo Convicted of Malware Scheme Infecting 400,000 Computers β
π Read
via "Threatpost".
The duo are convicted of infecting 400,000 computers in the U.S. with malware and scamming victims out of millions of dollars.π Read
via "Threatpost".
Threat Post
Romanian Duo Convicted of Malware Scheme Infecting 400,000 Computers
The duo are convicted of infecting 400,000 computers in the U.S. with malware and scamming victims out of millions of dollars.
π Friday Five: 4/12 Edition π
π Read
via "Subscriber Blog RSS Feed ".
A once defunct hacking forum returns, the New York Times on privacy, and spyware apps - catch up on the week's infosec news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 4/12 Edition
A once defunct hacking forum returns, the New York Times on privacy, and spyware apps - catch up on the week's infosec news with this roundup!
π΄ Romanians Convicted in Cybertheft Scheme π΄
π Read
via "Dark Reading: ".
Working out of Bucharest since 2007, a pair of criminals infected and controlled more than 400,000 individual computers, mostly in the US.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2017-14199
π Read
via "National Vulnerability Database".
A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0.π Read
via "National Vulnerability Database".
π 5 best password managers for Android π
π Read
via "Security on TechRepublic".
If you're looking for a password manager for your Android device, Jack Wallen offers his list of what he considers to be the best five on the market.π Read
via "Security on TechRepublic".
π΄ This Week in Security Funding: Where the Money Went π΄
π Read
via "Dark Reading: ".
Predictions for cybersecurity investment in 2019 are holding true with funding announcements from four startups.π Read
via "Dark Reading: ".
Dark Reading
This Week in Security Funding: Where the Money Went
Predictions for cybersecurity investment in 2019 are holding true with funding announcements from four startups.
π 5 best password managers for Android π
π Read
via "Security on TechRepublic".
If you're looking for a password manager for your Android, below are five of the best.π Read
via "Security on TechRepublic".
TechRepublic
5 best password managers for Android
If you're looking for a password manager for your Android, below are five of the best.
π΄ US-CERT, CISA Warn of Vuln in at Least 4 Major VPNs π΄
π Read
via "Dark Reading: ".
VPN products by Cisco, Palo Alto Networks, F5 Networks, Pulse Secure, insecurely store session cookies.π Read
via "Dark Reading: ".
Dark Reading
US-CERT, CISA Warn of Vuln in at Least 4 Major VPNs
VPN products by Cisco, Palo Alto Networks, F5 Networks, Pulse Secure, insecurely store session cookies.
π΄ Senate Report on Equifax Raises Questions Ahead of FICO Product Announcement π΄
π Read
via "Dark Reading: ".
Equifax is slammed in a Senate subcommittee report ahead of the announcement of a joint service with FICO.π Read
via "Dark Reading: ".
Darkreading
Senate Report on Equifax Raises Questions Ahead of FICO Product Announcement
Equifax is slammed in a Senate subcommittee report ahead of the announcement of a joint service with FICO.
β Can you detect hidden cameras in hotel rooms? [VIDEO] β
π Read
via "Naked Security".
Naked Security Live investigates how to sniff out snoopy spycams. We explain what works, and what doesn't, when it comes to hidden cameras.π Read
via "Naked Security".
Naked Security
Can you detect hidden cameras in hotel rooms? [VIDEO]
Naked Security Live investigates how to sniff out snoopy spycams. We explain what works, and what doesnβt, when it comes to hidden cameras.
β Facebook admits βsupply chain data leakβ in new Oculus headsets β
π Read
via "Naked Security".
One week out from Easter, and Facebook's Oculus subsidiary has admitted a "hidden message Easter Egg" gone wrong. Coincidence? Or...π Read
via "Naked Security".
Naked Security
Facebook admits βsupply chain data leakβ in new Oculus headsets
One week out from Easter, and Facebookβs Oculus subsidiary has admitted a βhidden message Easter Eggβ gone wrong. Coincidence? Orβ¦
β Monday review β the hot 24 stories of the week β
π Read
via "Naked Security".
From hidden cameras in Airbnb rentals to iPads locked for 48 years - here's everything we wrote last week.π Read
via "Naked Security".
Sophos
Monday review β the hot 24 stories of the week β Naked Security
From hidden cameras in Airbnb rentals to iPads locked for 48 years - here's everything we wrote last week.
β Dragonblood: Data-leaking flaw in WPA3 Wi-Fi authentication β
π Read
via "Naked Security".
Researchers have discovered several holes in a new security protocol for wireless networks.π Read
via "Naked Security".
Naked Security
Dragonblood: Data-leaking flaw in WPA3 Wi-Fi authentication
Researchers have discovered several holes in a new security protocol for wireless networks.