π΄ How Storytelling Can Help Keep Your Company Safe π΄
π Read
via "Dark Reading: ".
Well-crafted narratives can help you win over users in the battle to develop a sustainable cybersecurity culture.π Read
via "Dark Reading: ".
Dark Reading
How Storytelling Can Help Keep Your Company Safe
Well-crafted narratives can help you win over users in the battle to develop a sustainable cybersecurity culture.
β Multiple Sierra Wireless AirLink Routers Open to Remote Code Execution β
π Read
via "Threatpost".
Critical flaws in the software of Sierra Wireless' AirLink routers enable an array of malicious attacks.π Read
via "Threatpost".
Threat Post
Multiple Sierra Wireless AirLink Routers Open to Remote Code Execution
Critical flaws in the software of Sierra Wireless' AirLink routers enable an array of malicious attacks.
β Retefe Banking Trojan Resurfaces, Says Goodbye to Tor β
π Read
via "Threatpost".
The malware has new tricks, like using the stunnel encrypted tunneling mechanism and abusing a legitimate shareware app.π Read
via "Threatpost".
Threat Post
Retefe Banking Trojan Resurfaces, Says Goodbye to Tor
The malware has new tricks, like using the stunnel encrypted tunneling mechanism and abusing a legitimate shareware app.
π΄ The 2019 State of Cloud Security π΄
π Read
via "Dark Reading: ".
Enterprise cloud security is making real progress, but emerging technologies call for security teams to keep up the pace.π Read
via "Dark Reading: ".
Dark Reading
The 2019 State of Cloud Security
Enterprise cloud security is making real progress, but emerging technologies call for security teams to keep up the pace.
π΄ New Executive Order Aims to Grow Federal Cybersecurity Staff π΄
π Read
via "Dark Reading: ".
The EO outlines a 'rotational assignment program' intended to help security practitioners develop their skills.π Read
via "Dark Reading: ".
Dark Reading
New Executive Order Aims to Grow Federal Cybersecurity Staff
The EO outlines a 'rotational assignment program' intended to help security practitioners develop their skills.
π Friday Five: 5/3 Edition π
π Read
via "Subscriber Blog RSS Feed ".
When coding is criminal, why HIPAA mandates breaches be reported after 60 days, and evaluating GDPR are all covered in this week's Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 5/3 Edition
When coding is criminal, why HIPAA mandates breaches be reported after 60 days, and evaluating GDPR are all covered in this week's Friday Five.
β Belgian programmer solves cryptographic puzzle β 15 years too soon! β
π Read
via "Naked Security".
Belgian coder Bernard Fabrot just finished a 3.5-year computational marathon, solving a fascinating cryptopuzzle set at MIT back in 1999.π Read
via "Naked Security".
Naked Security
Belgian programmer solves cryptographic puzzle β 15 years too soon!
Belgian coder Bernard Fabrot just finished a 3.5-year computational marathon, solving a fascinating cryptopuzzle set at MIT back in 1999.
β News Wrap: Cartoon Network Hack, the Catholic Church and Jason Statham Scams β
π Read
via "Threatpost".
The Threatpost team breaks down the strangest security stories this week - from Cartoon Network hacked to show stripper videos, to a church being scammed out of $1.75 million.π Read
via "Threatpost".
Threat Post
News Wrap: Cartoon Network Hack, the Catholic Church and Jason Statham Scams
The Threatpost team breaks down the strangest security stories this week - from Cartoon Network hacked to show stripper videos, to a church being scammed out of $1.75 million.
π΄ Massive Dark Web 'Wall Street Market' Shuttered π΄
π Read
via "Dark Reading: ".
Europol-led international law enforcement operation led to takedown of world's second-largest digital underground marketplace.π Read
via "Dark Reading: ".
Darkreading
Massive Dark Web 'Wall Street Market' Shuttered
Europol-led international law enforcement operation led to takedown of world's second-largest digital underground marketplace.
β Researchers Weigh in on Trumpβs Cyber Workforce Executive Order β
π Read
via "Threatpost".
Short on concrete details but long on affirming cybersecurity skills as a critical piece of federal defense, the White House executive order aims to bolster the national cyber workforce.π Read
via "Threatpost".
Threat Post
Researchers Weigh in on Trumpβs Cyber Workforce Executive Order
Short on concrete details but long on affirming cybersecurity skills as a critical piece of federal defense, the White House E.O. aims to bolster the national cyber workforce.
β Mozilla bug throws Tor Browser users into chaos β
π Read
via "Naked Security".
A Mozilla bug has made everyone's Firefox addons 'untrustworthy' - including turning off the important NoScript security feature in Tor.π Read
via "Naked Security".
Naked Security
Mozilla bug throws Tor Browser users into chaos
A Mozilla bug has made everyoneβs Firefox addons βuntrustworthyβ β including turning off the important NoScript security feature in Tor.
β Amid Bug Bounty Hype, Sometimes Security is Left in the Dust β
π Read
via "Threatpost".
Amidst the PR glitz and popularity of bug bounty programs, experts worry that actual smart security strategy is being left behind.π Read
via "Threatpost".
Threat Post
Amid Bug Bounty Hype, Sometimes Security is Left in the Dust
Amidst the PR glitz and popularity of bug bounty programs, experts worry that actual smart security strategy is being left behind.
β Extinguishing the IoT Insecurity Dumpster Fire β
π Read
via "Threatpost".
Will connected devices be insecure forever? Or will legislation - such as the recent UK mandate announced this week - help boost IoT security?π Read
via "Threatpost".
Threat Post
Extinguishing the IoT Insecurity Dumpster Fire
Will connected devices be insecure forever? Or will legislation - such as the recent UK mandate announced this week - help boost IoT security?
π΄ Trust the Stack, Not the People π΄
π Read
via "Dark Reading: ".
A completely trusted stack lets the enterprise be confident that apps and data are treated and protected wherever they are.π Read
via "Dark Reading: ".
Darkreading
Trust the Stack, Not the People
A completely trusted stack lets the enterprise be confident that apps and data are treated and protected wherever they are.
β Tor Security Add-On Abruptly Killed by Mozilla Bug β
π Read
via "Threatpost".
A digital signing flaw killed add-ons for Firefox as well as Tor -- and no patch is yet available for Tor users.π Read
via "Threatpost".
Threat Post
Tor Security Add-On Abruptly Killed by Mozilla Bug
A digital signing flaw killed add-ons for Firefox as well as Tor β and no patch is yet available for Tor users.
β High-Severity PrinterLogic Flaws Enable Remote Code Execution β
π Read
via "Threatpost".
The three flaws enable an unauthenticated attacker to launch remote code execution attacks on printers.π Read
via "Threatpost".
Threat Post
High-Severity PrinterLogic Flaws Enable Remote Code Execution
The three flaws enable an unauthenticated attacker to launch remote code execution attacks on printers.
β Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting β
π Read
via "Threatpost".
Web scammers are going after Marvel fans as the movie passes the $2.2 billion box-office mark, making it the second-highest grossing film of all time, behind only Avatar.π Read
via "Threatpost".
Threat Post
Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting
Web scammers are going after Marvel fans as the movie passes the $2.2 billion box-office mark, making it the second-highest grossing film of all time, behind only Avatar.
π Certificate issue disabling add-ons in Firefox and Tor Browser finally fixed π
π Read
via "Security on TechRepublic".
Mozilla forces third party add-ons to be digitally signed, though an expired certificate disabled these, causing confusion among users of Firefox and the Tor Browser over the weekend.π Read
via "Security on TechRepublic".
TechRepublic
Certificate issue disabling add-ons in Firefox and Tor browser finally fixed
Mozilla forces third-party add-ons to be digitally signed, though an expired certificate disabled these, causing confusion among users of Firefox and the Tor browser over the weekend.
π΄ Security Top Concern as Mobile Providers Think 5G π΄
π Read
via "Dark Reading: ".
The deployment of 5G networks will bring new use cases and revenue opportunities, mobile providers say, but security will be essential.π Read
via "Dark Reading: ".
Dark Reading
Mobile Security recent news | Dark Reading
Explore the latest news and expert commentary on Mobile Security, brought to you by the editors of Dark Reading
π Popcorn Recipe Case Highlights Niche Trade Secret Theft Risk π
π Read
via "Subscriber Blog RSS Feed ".
This company protected its sensitive data with biometric thumbprint scanner but still managed to suffer trade secret theft after a former director of research allegedly stole gigabytes of data on its recipes.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Popcorn Recipe Case Highlights Niche Trade Secret Theft Risk
This company protected its sensitive data with biometric thumbprint scanner but still managed to suffer trade secret theft after a former director of research allegedly stole gigabytes of data on its recipes.