π΄ FBI: $2.7 billion in Losses to Cyber-Enabled Crimes in 2018 π΄
π Read
via "Dark Reading: ".
Internet Crime Complaint Center (IC3) last year received an average of 900+ reports daily of Internet-enabled theft, fraud, and exploitation.π Read
via "Dark Reading: ".
Dark Reading
FBI: $2.7 billion in Losses to Cyber-Enabled Crimes in 2018
Internet Crime Complaint Center (IC3) last year received an average of 900+ reports daily of Internet-enabled theft, fraud, and exploitation.
ATENTIONβΌ New - CVE-2013-7470
π Read
via "National Vulnerability Database".
cipso_v4_validate in include/net/cipso_ipv4.h in the Linux kernel before 3.11.7, when CONFIG_NETLABEL is disabled, allows attackers to cause a denial of service (infinite loop and crash), as demonstrated by icmpsic, a different vulnerability than CVE-2013-0310.π Read
via "National Vulnerability Database".
β Tuesday review β the hot 21 stories of the week β
π Read
via "Naked Security".
A day late! From the weakness in several VPNs to the Internet Explorer browser flaw, and much more - catch up on everything we wrote last week.π Read
via "Naked Security".
Naked Security
Tuesday review β the hot 21 stories of the week
A day late! From the weakness in several VPNs to the Internet Explorer browser flaw, and much more β catch up on everything we wrote last week.
π΄ 1 in 4 Workers Are Aware Of Security Guidelines - but Ignore Them π΄
π Read
via "Dark Reading: ".
1 in 4 Workers Are Aware Of Company IT Security Guidelines but Don't Follow Themπ Read
via "Dark Reading: ".
Dark Reading
1 in 4 Workers Are Aware Of Security Guidelines - but Ignore Them
1 in 4 Workers Are Aware Of Company IT Security Guidelines but Don't Follow Them
π΄ 7 Ways to Get the Most from Your IDS/IPS π΄
π Read
via "Dark Reading: ".
Intrusion detection and prevention is at the foundation of successful security in-depth. Securing the perimeter requires a solid understanding of these two critical components.π Read
via "Dark Reading: ".
Dark Reading
7 Ways to Get the Most from Your IDS/IPS
Intrusion detection and prevention is at the foundation of successful security in-depth. Securing the perimeter requires a solid understanding of these two critical components.
β Once again, itβs 123456: the password that says βI give upβ β
π Read
via "Naked Security".
A new survey says 46% of users find security confusing, which helps explain how that old clunker keeps popping to the top of breach lists.π Read
via "Naked Security".
Naked Security
Once again, itβs 123456: the password that says βI give upβ
A new survey says 46% of users find security confusing, which helps explain how that old clunker keeps popping to the top of breach lists.
β Hotspot finder app blabs 2 million Wi-Fi network passwords β
π Read
via "Naked Security".
If you used WiFi Finder, your passwords to both public and private networks have been left online in an unprotected database.π Read
via "Naked Security".
Naked Security
Hotspot finder app blabs 2 million Wi-Fi network passwords
If you used WiFi Finder, your passwords to both public and private networks have been left online in an unprotected database.
π Weaponization of vulnerabilities in Adobe products more than doubled in 2018 π
π Read
via "Security on TechRepublic".
Using free Adobe software like Flash Player and Adobe Reader can pose a security risk in your organization.π Read
via "Security on TechRepublic".
TechRepublic
Weaponization of vulnerabilities in Adobe products more than doubled in 2018
Using free Adobe software like Flash Player and Adobe Reader can pose a security risk in your organization.
π΄ Will the US Adopt a National Privacy Law? π΄
π Read
via "Dark Reading: ".
Probably not before the 2020 election. But keep an eye on this Congress as legislators debate how to define personal data and what limits to place on how companies use it.π Read
via "Dark Reading: ".
Dark Reading
Will the US Adopt a National Privacy Law?
Probably not before the 2020 election. But keep an eye on this Congress as legislators debate how to define personal data and what limits to place on how companies use it.
β Phone fingerprint scanner fooled by chewing gum packet β
π Read
via "Naked Security".
A video has surfaced claiming to show someone unlocking a Nokia 9 by tapping a gum packet against the fingerprint scanner.π Read
via "Naked Security".
Naked Security
Phone fingerprint scanner fooled by chewing gum packet
A video has surfaced claiming to show someone unlocking a Nokia 9 by tapping a gum packet against the fingerprint scanner.
β FBI: BEC Scam Losses Almost Double To Reach $1.2 Billion β
π Read
via "Threatpost".
Overall, in 2018 the FBI received more than 351k reported scams with losses exceeding $2.7 billion.π Read
via "Threatpost".
Threat Post
FBI: BEC Scam Losses Almost Double To Reach $1.2 Billion
Overall, in 2018 the FBI received more than 351k reported scams with losses exceeding $2.7 billion.
π How businesses plan to protect themselves against cyberattacks π
π Read
via "Security on TechRepublic".
Many organizations will spend more to shore up their defenses against cyberattacks this year, says business insurance provider Hiscox.π Read
via "Security on TechRepublic".
TechRepublic
How businesses plan to protect themselves against cyberattacks
Many organizations will spend more to shore up their defenses against cyberattacks this year, says business insurance provider Hiscox.
ATENTIONβΌ New - CVE-2018-1317
π Read
via "National Vulnerability Database".
In Apache Zeppelin prior to 0.8.0 the cron scheduler was enabled by default and could allow users to run paragraphs as other users without authentication.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-12619
π Read
via "National Vulnerability Database".
Apache Zeppelin prior to 0.7.3 was vulnerable to session fixation which allowed an attacker to hijack a valid user session. Issue was reported by "stone lone".π Read
via "National Vulnerability Database".
β Exploits for Social Warfare WordPress Plugin Reach Critical Mass β
π Read
via "Threatpost".
More and more attacks taking advantage of a XSS and RCE bug in the popular plugin have cropped up in the wild.π Read
via "Threatpost".
Threat Post
Exploits for Social Warfare WordPress Plugin Reach Critical Mass
More and more attacks taking advantage of a XSS and RCE bug in the popular plugin have cropped up in the wild.
π΄ When Every Attack Is a Zero Day π΄
π Read
via "Dark Reading: ".
Stopping malware the first time is an ideal that has remained tantalizingly out of reach. But automation, artificial intelligence, and deep learning are poised to change that.π Read
via "Dark Reading: ".
Darkreading
When Every Attack Is a Zero Day
Stopping malware the first time is an ideal that has remained tantalizingly out of reach. But automation, artificial intelligence, and deep learning are poised to change that.
π΄ Exploits for Adobe Vulnerabilities Spiked in 2018 π΄
π Read
via "Dark Reading: ".
With Flash Player on way out, attackers are renewing their focus on Acrobat Reader, RiskSense found.π Read
via "Dark Reading: ".
Dark Reading
Exploits for Adobe Vulnerabilities Spiked in 2018
With Flash Player on way out, attackers are renewing their focus on Acrobat Reader, RiskSense found.
π Breaking Down the Nigeria Data Protection Regulation π
π Read
via "Subscriber Blog RSS Feed ".
The regulation, issued in January, could pace Nigeria as a leader in data protection in Africa.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Breaking Down the Nigeria Data Protection Regulation
The regulation, issued in January, could pace Nigeria as a leader in data protection in Africa.
π΄ App Exposes Wi-Fi Credentials for Thousands of Private Networks π΄
π Read
via "Dark Reading: ".
A database used by WiFi Finder was left open and unprotected on the Internet.π Read
via "Dark Reading: ".
Dark Reading
App Exposes Wi-Fi Credentials for Thousands of Private Networks
A database used by WiFi Finder was left open and unprotected on the Internet.
π΄ City of Stuart Still Recovering from Ryuk Ransomware Attack π΄
π Read
via "Dark Reading: ".
Officials are investigating an April 13 ransomware attack that targeted Stuart's city servers and forced it offline.π Read
via "Dark Reading: ".
Darkreading
City of Stuart Still Recovering from Ryuk Ransomware Attack
Officials are investigating an April 13 ransomware attack that targeted Stuart's city servers and forced it offline.
β Carbanak Source Code Unveils a Startlingly Complex Malware β
π Read
via "Threatpost".
The malware is behind billions in banking and credit-card losses.π Read
via "Threatpost".
Threat Post
Carbanak Source Code Unveils a Startlingly Complex Malware
The malware is behind billions in banking and credit-card losses.