β Monday review β the hot 17 stories of the week β
π Read
via "Naked Security".
From DNS over HTTPS to Microsoft's expiration policy - and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Piracy streaming apps are stuffed with malware β
π Read
via "Naked Security".
Researchers have found that hackers are exploiting vulnerable piracy streaming devices to steal credit card data or rope them into botnets.π Read
via "Naked Security".
Naked Security
Piracy streaming apps are stuffed with malware
Researchers have found that hackers are exploiting vulnerable piracy streaming devices to steal credit card data or rope them into botnets.
β Cops need warrant for both location history and phone pinging, says judge β
π Read
via "Naked Security".
It's one of the first location data privacy cases to grapple with the warrant and surveillance implications of the Carpenter decision.π Read
via "Naked Security".
Naked Security
Cops need warrant for both location history and phone pinging, says judge
Itβs one of the first location data privacy cases to grapple with the warrant and surveillance implications of the Carpenter decision.
β Cryptocurrency giants in $850m fraud allegations β
π Read
via "Naked Security".
The New York Attorney General has accused major cryptocurrency exchange Bitfinex and cryptocurrency Tether of an $850m fraud.π Read
via "Naked Security".
Naked Security
Cryptocurrency giants in $850m fraud allegations
The New York Attorney General has accused major cryptocurrency exchange Bitfinex and cryptocurrency Tether of an $850m fraud.
β NIST tool boosts chances of finding dangerous software flaws β
π Read
via "Naked Security".
NIST thinks it has reached an important milestone in complex software testing with something called Combinatorial Coverage Measurement (CCM).π Read
via "Naked Security".
Naked Security
NIST tool boosts chances of finding dangerous software flaws
NIST thinks it has reached an important milestone in complex software testing with something called Combinatorial Coverage Measurement (CCM).
π΄ Learn to Defend Against HTTP Desync Attacks at Black Hat USA π΄
π Read
via "Dark Reading: ".
Save the Date: Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8.π Read
via "Dark Reading: ".
Dark Reading
Learn to Defend Against HTTP Desync Attacks at Black Hat USA
Save the Date: Black Hat USA returns to the Mandalay Bay in Las Vegas August 3-8.
π Risk management tips from the SBA and NIST every small-business owner should read π
π Read
via "Security on TechRepublic".
Shifting cybersecurity from a defensive posture to one of managing risk is becoming more important for small-business owners. Here's must-read risk-management guidance.π Read
via "Security on TechRepublic".
TechRepublic
Risk management tips from the SBA and NIST every small-business owner should read
Shifting cybersecurity from a defensive posture to one of managing risk is becoming more important for small-business owners. Here's must-read risk-management guidance.
π Half of companies have 1,000+ sensitive files accessible to every employee π
π Read
via "Security on TechRepublic".
Post-GDPR, businesses are still failing to adequately protect sensitive data, according to a Varonis report.π Read
via "Security on TechRepublic".
TechRepublic
Half of companies have 1,000+ sensitive files accessible to every employee
Post-GDPR, businesses are still failing to adequately protect sensitive data, according to a Varonis report.
π 75% of people are stressed about remembering passwords π
π Read
via "Security on TechRepublic".
Two-thirds of consumers say having their bank accounts compromised would be more stressful than losing their job, according to a Kaspersky report.π Read
via "Security on TechRepublic".
TechRepublic
75% of people are stressed about remembering passwords
Two-thirds of consumers say having their bank accounts compromised would be more stressful than losing their job, according to a Kaspersky report.
β 2 Million IoT Devices Vulnerable to Complete Takeover β
π Read
via "Threatpost".
Millions of security cameras, baby monitors and "smart" doorbells are open to hijack - and no solution is currently available.π Read
via "Threatpost".
Threat Post
2 Million IoT Devices Vulnerable to Complete Takeover
Millions of security cameras, baby monitors and "smart" doorbells are open to hijack - and no solution is currently available.
π BEC Scams Responsible for $1.2B in Losses in 2018 π
π Read
via "Subscriber Blog RSS Feed ".
It sounds like business email compromise attacks, attacks that rely on tricking recipients, usually executives, into conducting wire transfers, aren't going away anytime soon.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
BEC Scams Responsible for $1.2B in Losses in 2018
It sounds like business email compromise attacks, attacks that rely on tricking recipients, usually executives, into conducting wire transfers, aren't going away anytime soon.
β Docker Hub Hack Affects 190K Accounts β
π Read
via "Threatpost".
Github and Bitbucket tokens for Docker autobuilds are also impacted.π Read
via "Threatpost".
Threat Post
Docker Hub Hack Affects 190K Accounts, with Concerning Consequences
Github and Bitbucket tokens for Docker autobuilds are also impacted.
π΄ A Rear-View Look at GDPR: Compliance Has No Brakes π΄
π Read
via "Dark Reading: ".
With a year of Europe's General Data Protection Regulation under our belt, what have we learned?π Read
via "Dark Reading: ".
Darkreading
A Rear-View Look at GDPR: Compliance Has No Brakes
With a year of Europe's General Data Protection Regulation under our belt, what have we learned?
π Why marketing teams are critical to successful cybersecurity efforts π
π Read
via "Security on TechRepublic".
Marketers often focus on cybersecurity best practices after there is an incident, though experts say that needs to change to improve a company's chances of surviving a cyberattack.π Read
via "Security on TechRepublic".
TechRepublic
Why marketing teams are critical to successful cybersecurity efforts
Marketers often focus on cybersecurity best practices after there is an incident, though experts say that needs to change to improve a company's chances of surviving a cyberattack.
π Can password managers protect you from hackers? π
π Read
via "Security on TechRepublic".
Microsoft Identity Division's corporate vice president of program management Alex Simons sat down with Dan Patterson to discuss the different threats facing the enterprise today.π Read
via "Security on TechRepublic".
π Can password managers protect you from hackers? π
π Read
via "Security on TechRepublic".
Microsoft Identity Division's corporate vice president of program management Alex Simons sat down with Dan Patterson to discuss the different threats facing the enterprise today.π Read
via "Security on TechRepublic".
ATENTIONβΌ New - CVE-2018-12384
π Read
via "National Vulnerability Database".
When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10749
π Read
via "National Vulnerability Database".
parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9285
π Read
via "National Vulnerability Database".
esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ URI.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-1343 (ubuntu_linux)
π Read
via "National Vulnerability Database".
All versions of unity-scope-gdrive logs search terms to syslog.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-1341 (apport, ubuntu_linux)
π Read
via "National Vulnerability Database".
Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Appoprt before 2.19.2 function _python_module_path.π Read
via "National Vulnerability Database".