π΄ Free Princeton Application Provides IoT Traffic Insight π΄
π Read
via "Dark Reading: ".
The application developed by a research group allows users to spot possible IoT security problems.π Read
via "Dark Reading: ".
Dark Reading
Free Princeton Application Provides IoT Traffic Insight
The application developed by a research group allows users to spot possible IoT security problems.
π Friday Five: 4/19 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Possible new regulation for the supply chain space, hijacking DNS, and another Facebook privacy misstep. Catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 4/19 Edition
Possible new regulation for the supply chain space, hijacking DNS, and another Facebook privacy misstep. Catch up on the week's news with this roundup!
π΄ APT34 Toolset, Victim Data Leaked via Telegram π΄
π Read
via "Dark Reading: ".
For the last month, an unknown individual or group has been sharing data and hacking tools belonging to Iranian hacker group APT34.π Read
via "Dark Reading: ".
Darkreading
APT34 Toolset, Victim Data Leaked via Telegram
For the last month, an unknown individual or group has been sharing data and hacking tools belonging to Iranian hacker group APT34.
π΄ Russia Hacked Clinton's Computers Five Hours After Trump's Call π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Mueller report finds that in July 2016, after then-candidate Donald Trump publicly called for Russia to find the 30,000 emails, Russian agents targeted Hillary Clinton's personal office with cyberattacks.
β Insecure Ride App Database Leaks Data of 300K Iranian Drivers β
π Read
via "Threatpost".
A researcher said that millions of records were leaking 300,000 Tap30 drivers' names, ID numbers and phone numbers.π Read
via "Threatpost".
Threat Post
Insecure Ride App Database Leaks Data of 300K Iranian Drivers
A researcher said that millions of records were leaking Tap30 drivers' names, ID numbers and phone numbers.
π How to generate SSH keys in OpenSSH for Windows 10 π
π Read
via "Security on TechRepublic".
Further extend Microsoft's implementation of OpenSSH in Windows 10 by generating your own secure keys.π Read
via "Security on TechRepublic".
TechRepublic
How to generate SSH keys in OpenSSH for Windows 10
Further extend Microsoft's implementation of OpenSSH in Windows 10 by generating your own secure keys.
β Three-Fourths of Consumers Donβt Trust Facebook, Threatpost Poll Finds β
π Read
via "Threatpost".
On the heels of several Facebook data privacy snafus this week - and over the past year - users no longer trust the platform.π Read
via "Threatpost".
Threat Post
Three-Fourths of Consumers Donβt Trust Facebook, Threatpost Poll Finds
On the heels of several Facebook data privacy snafus this week - and over the past year - users no longer trust the platform.
π Encryption: A cheat sheet π
π Read
via "Security on TechRepublic".
There's a lot to know about encryption, and the ins and outs can get confusing. Here's a rundown of what professionals need to know about this fundamental of modern computing.π Read
via "Security on TechRepublic".
TechRepublic
Encryption: A cheat sheet
There's a lot to know about encryption, and the ins and outs can get confusing. Here's a rundown of what professionals need to know about this fundamental of modern computing.
π΄ Researchers Find Clues for Dramatically Reducing IDS Traffic Volume π΄
π Read
via "Dark Reading: ".
Research at military labs and Towson University shows that identifying malicious activity may require much less captured data than has been the case.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Microsoftβs Latest Patch Hoses Some Antivirus Software β
π Read
via "Threatpost".
McAfee, Sophos and Avast are among the antivirus software suites impacted.π Read
via "Threatpost".
Threat Post
Microsoftβs Latest Patch Hoses Some Antivirus Software
McAfee, Sophos and Avast are among the antivirus software suites effected.
π How to delete the Windows 10 paging file on every shutdown π
π Read
via "Security on TechRepublic".
A simple tweak of the Windows 10 Registry file can eliminate one often overlooked security concern.π Read
via "Security on TechRepublic".
TechRepublic
How to delete the Windows 10 paging file on every shutdown
A simple tweak of the Windows 10 Registry file can eliminate one often overlooked security concern.
β WannaCry hero Hutchins now officially a convicted cybercriminal β
π Read
via "Naked Security".
The youngster who spent his own money to protect people from the WannaCry virus has pleaded guilty to malware-related cybercrime charges.π Read
via "Naked Security".
Naked Security
WannaCry hero Hutchins now officially a convicted cybercriminal
The youngster who spent his own money to protect people from the WannaCry virus has pleaded guilty to malware-related cybercrime charges.
π The 5 most hacked passwords π
π Read
via "Security on TechRepublic".
More than 23 million people were breached after using the password 123456, according to the UK's National Cyber Security Centre.π Read
via "Security on TechRepublic".
TechRepublic
The 5 most hacked passwords
More than 23 million people were breached after using the password 123456, according to the UK's National Cyber Security Centre.
β Millions of Medical Documents for Addiction and Recovery Patients Leaked β
π Read
via "Threatpost".
The information includes data on all rehab treatments and procedures, linked with patients' names and other info.π Read
via "Threatpost".
Threat Post
Millions of Medical Documents for Addiction and Recovery Patients Leaked
The information includes data on all rehab treatments and procedures, linked with patients' names and other info.
β Can you get hit by someone elseβs ransomware? [VIDEO] β
π Read
via "Naked Security".
How to protect yourself from being *affected* by malware, even if you're not yourself *infected*.π Read
via "Naked Security".
Naked Security
Can you get hit by someone elseβs ransomware? [VIDEO]
How to protect yourself from being *affected* by malware, even if youβre not yourself *infected*.
π΄ 4 Tips to Protect Your Business Against Social Media Mistakes π΄
π Read
via "Dark Reading: ".
Don't let social media become the go-to platform for cybercriminals looking to steal sensitive corporate information or cause huge reputational damage.π Read
via "Dark Reading: ".
Darkreading
4 Tips to Protect Your Business Against Social Media Mistakes
Don't let social media become the go-to platform for cybercriminals looking to steal sensitive corporate information or cause huge reputational damage.
β WannaCry Hero Pleads Guilty to Kronos Malware Charges β
π Read
via "Threatpost".
The malware researcher has pleaded guilty to two out of 10 charges; one with creating the Kronos malware and the other with conspiracy.π Read
via "Threatpost".
Threat Post
WannaCry Hero Pleads Guilty to Kronos Malware Charges
The malware researcher has pleaded guilty to two out of 10 charges; one with creating the Kronos malware and the other with conspiracy.
π How to update the Nmap database π
π Read
via "Security on TechRepublic".
Your nmap service probe database is probably way out of date. Jack Wallen shows you how to update that special file to the latest version.π Read
via "Security on TechRepublic".
TechRepublic
How to update the nmap database
Your nmap service probe database is probably out of date. It's easy to update that special file to the latest version.
π How to update the nmap database π
π Read
via "Security on TechRepublic".
Your nmap service probe database is probably out of date. It's easy to update that special file to the latest version.π Read
via "Security on TechRepublic".
TechRepublic
How to update the nmap database
Your nmap service probe database is probably out of date. It's easy to update that special file to the latest version.
β Franceβs βSecureβ Telegram Replacement Hacked in an Hour β
π Read
via "Threatpost".
The messaging app that will replace the government's use of WhatsApp and Telegram was released last week, with security vulnerability included.π Read
via "Threatpost".
Threat Post
Franceβs βSecureβ Telegram Replacement Hacked in an Hour
The messaging app that will replace the government's use of WhatsApp and Telegram was released last week, with security vulnerability included.
ATENTIONβΌ New - CVE-2018-20818
π Read
via "National Vulnerability Database".
A buffer overflow vulnerability was discovered in the OpenPLC controller, in the OpenPLC_v2 and OpenPLC_v3 versions. It occurs in the modbus.cpp mapUnusedIO() function, which can cause a runtime crash of the PLC or possibly have unspecified other impact.π Read
via "National Vulnerability Database".