π΄ Attackers Are Messing with Encryption Traffic to Evade Detection π΄
π Read
via "Dark Reading: ".
Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.π Read
via "Dark Reading: ".
Dark Reading
Attackers Are Messing with Encryption Traffic to Evade Detection
Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.
π΄ New Intel Vulnerabilities Bring Fresh CPU Attack Dangers π΄
π Read
via "Dark Reading: ".
Four newly discovered vulns from the speculative-execution family bring Meltdown-like threats to Intel's processors.π Read
via "Dark Reading: ".
Dark Reading
New Intel Vulnerabilities Bring Fresh CPU Attack Dangers
Four newly discovered vulns from the speculative-execution family bring Meltdown-like threats to Intel's processors.
π΄ GDPR Drives Changes, but Privacy by Design Proves Elusive π΄
π Read
via "Dark Reading: ".
One year later, the EU mandate's biggest impact has been to focus more attention on data protection and privacy, security analysts say.π Read
via "Dark Reading: ".
Darkreading
GDPR Drives Changes, but Privacy by Design Proves Elusive
One year later, the EU mandate's biggest impact has been to focus more attention on data protection and privacy, security analysts say.
π Cheat sheet: How to become a cybersecurity pro π
π Read
via "Security on TechRepublic".
If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field.π Read
via "Security on TechRepublic".
TechRepublic
How to become a cybersecurity pro: A cheat sheet
If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide about salaries, job markets, skills and common interview questions in the field, as well as the top security software.
β San Francisco bans police use of facial recognition β
π Read
via "Naked Security".
The city that gave us facial recognition tech says "not in my back yard".π Read
via "Naked Security".
Naked Security
San Francisco bans police use of facial recognition
The city that gave us facial recognition tech says βnot in my back yardβ.
β Severe Linux kernel flaw found in RDS β
π Read
via "Naked Security".
Unpatched Linux systems are vulnerable to remote compromise from the local network.π Read
via "Naked Security".
Naked Security
Severe Linux kernel flaw found in RDS
Unpatched Linux systems are vulnerable to remote compromise from the local network.
β Facebook restores disabled βView Asβ feature used in 2018 breach β
π Read
via "Naked Security".
The feature still lets you see how others see you, but without leaking access tokens.π Read
via "Naked Security".
Naked Security
Facebook restores disabled βView Asβ feature used in 2018 breach
The feature still lets you see how others see you, but without leaking access tokens.
β Cybercrime Gang Behind GozNym Banking Malware Dismantled β
π Read
via "Threatpost".
Europol said it has dismantled the cybercrime network behind the GozNym malware, which siphoned more than $100 million from businesses.π Read
via "Threatpost".
Threat Post
Cybercrime Gang Behind GozNym Banking Malware Dismantled
Europol said it has dismantled the cybercrime network behind the GozNym malware, which siphoned more than $100 million from businesses.
β Cisco Service Provider, WebEx Bugs Offer Up Remote Code Execution β
π Read
via "Threatpost".
The vendor also issued a patch schedule for the still-unpatched bug in its Secure Boot trusted hardware environment, which affects most of its enterprise and SMB portfolio, amounting to millions of vulnerable devices.π Read
via "Threatpost".
Threat Post
Cisco Service Provider, WebEx Bugs Offer Up Remote Code Execution
The vendor also issued a patch schedule for the still-unpatched bug in its Secure Boot trusted hardware environment, which affects most of its enterprise and SMB portfolio, amounting to millions of vulnerable devices.
π΄ Cyber Workforce Exec Order: Right Question, Wrong Answer π΄
π Read
via "Dark Reading: ".
Shuffling resources, adding administrative process, and creating a competition and incentive system will do little to grow and mature the talent we need to meet the cybersecurity challenges we face.π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
β Please vote for Naked Security at the European Blogger Awards 2018! β
π Read
via "Naked Security".
If you like what we do... please vote for us!π Read
via "Naked Security".
Naked Security
Please vote for Naked Security at the European Blogger Awards 2019!
If you like what we do⦠please vote for us!
π MDS vulnerabilities lead Chrome OS 74 to disable hyper-threading π
π Read
via "Security on TechRepublic".
Hyper-Threading, Intel's implementation of symmetric multithreading (SMT) can be exploited using the newly-disclosed MDS vulnerabilities, like Fallout and ZombieLoad.π Read
via "Security on TechRepublic".
TechRepublic
MDS vulnerabilities lead Chrome OS 74 to disable hyper-threading
Hyper-Threading, Intel's implementation of symmetric multithreading (SMT) can be exploited using the newly-disclosed MDS vulnerabilities, like Fallout and ZombieLoad.
π Data Security Standard for the Insurance Industry Catching On π
π Read
via "Subscriber Blog RSS Feed ".
Alabama is the latest state to adopt the Insurance Data Security Model Law, a legal framework that requires insurers to develop and implement an information security program and breach notification standards.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Data Security Standard for the Insurance Industry Catching On
Alabama is the latest state to adopt the Insurance Data Security Model Law, a legal framework that requires insurers to develop and implement an information security program among other security standards.
β Forbes Becomes Latest Victim of Magecart Payment Card Skimmer β
π Read
via "Threatpost".
The web skimming script was recently found stealing payment data on the websites of Forbes Magazine as well as seven others.π Read
via "Threatpost".
Threat Post
Forbes Becomes Latest Victim of Magecart Payment Card Skimmer
The web skimming script was recently found stealing payment data on the websites of Forbes Magazine as well as seven others.
β Mobile Risks Boom in a Post-Perimeter World β
π Read
via "Threatpost".
The bloom is on mobile, whether it be the enterprise, employees or the cybercriminals plotting new ways to slip past a corporate defenses in a post-parameter world.π Read
via "Threatpost".
Threat Post
Mobile Risks Boom in a Post-Perimeter World
The bloom is on mobile, whether it be the enterprise, employees or the cybercriminals plotting new ways to slip past a corporate defenses in a post-parameter world.
π΄ The Data Problem in Security π΄
π Read
via "Dark Reading: ".
CISOs must consider reputation, resiliency, and regulatory impact to establish their organization's guidelines around what data matters most.π Read
via "Dark Reading: ".
Darkreading
The Data Problem in Security
CISOs must consider reputation, resiliency, and regulatory impact to establish their organization's guidelines around what data matters most.
π΄ US Charges Members of GozNym Cybercrime Gang π΄
π Read
via "Dark Reading: ".
The FBI and counterparts from other nations say group infected over 41,000 computers with malware that steals banking credentials.π Read
via "Dark Reading: ".
Darkreading
US Charges Members of GozNym Cybercrime Gang
The FBI and counterparts from other nations say group infected over 41,000 computers with malware that steals banking credentials.
π΄ Executive Order Limits Certain Tech Sales, Hits Huawei Hard π΄
π Read
via "Dark Reading: ".
The executive order signed by President Trump bars the sale or installation of equipment seen to be controlled by hostile foreign governments and a threat to national security.π Read
via "Dark Reading: ".
Dark Reading
Executive Order Limits Certain Tech Sales, Hits Huawei Hard
The executive order signed by President Trump bars the sale or installation of equipment seen to be controlled by hostile foreign governments and a threat to national security.
π΄ Google to Replace Titan Security Keys Affected by Bluetooth Bug π΄
π Read
via "Dark Reading: ".
A misconfiguration in Bluetooth Titan Security Keys' pairing protocols could compromise users under specific circumstances.π Read
via "Dark Reading: ".
Dark Reading
Google to Replace Titan Security Keys Affected by Bluetooth Bug
A misconfiguration in Bluetooth Titan Security Keys' pairing protocols could compromise users under specific circumstances.
β Trump seeks tales of social media bias β and your phone number β
π Read
via "Naked Security".
A tool from the White House invites those who suspect political bias in social media censorship to "share their story with President Trump."π Read
via "Naked Security".
Naked Security
Trump seeks tales of social media bias β and your phone number
A tool from the White House invites those who suspect political bias in social media censorship to βshare their story with President Trump.β
β Europol arrests end GozNym banking malware gang β
π Read
via "Naked Security".
Arrests in Europe and the US appear to have ended the cybercrime careers of the gang behind the GozNym banking malware.π Read
via "Naked Security".
Naked Security
Europol arrests end GozNym banking malware gang
Arrests in Europe and the US appear to have ended the cybercrime careers of the gang behind the GozNym banking malware.