ATENTIONβΌ New - CVE-2018-12270
π Read
via "National Vulnerability Database".
In Valve Steam 1528829181 BETA, it is possible to perform a homograph / homoglyph attack to create fake URLs in the client, which may trick users into visiting unintended web sites.π Read
via "National Vulnerability Database".
π How has GDPR actually affected businesses? π
π Read
via "Security on TechRepublic".
The EU's General Data Protection Regulation is now a year old, and has resulted in financial repercussions and changes to how businesses handle data.π Read
via "Security on TechRepublic".
TechRepublic
How has GDPR actually affected businesses?
The EU's General Data Protection Regulation is now a year old, and has resulted in financial repercussions and changes to how businesses handle data.
π The current cybersecurity landscape of guerrilla warfare π
π Read
via "Security on TechRepublic".
A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.π Read
via "Security on TechRepublic".
TechRepublic
The current cybersecurity landscape of guerrilla warfare
A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.
π The current cybersecurity landscape of guerrilla warfare π
π Read
via "Security on TechRepublic".
A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.π Read
via "Security on TechRepublic".
TechRepublic
The current cybersecurity landscape of guerrilla warfare
A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.
π California Consumer Privacy Act Amendment Blocked by Lawmakers π
π Read
via "Subscriber Blog RSS Feed ".
SB 561, a contested amendment to the California Consumer Privacy Act that could have expanded the right of consumers to sue companies over their handling of personal data, has been shelved by the state for now, likely giving businesses a sigh a relief.π Read
via "Subscriber Blog RSS Feed ".
β Windows 10 Update Bricks PCs, Microsoft Offers Workarounds β
π Read
via "Threatpost".
A glitch in Microsoft's Windows 10 update is causing systems to freeze after users tried to use the System Reboot function. Luckily, workarounds exist.π Read
via "Threatpost".
Threat Post
Windows 10 Update Bricks PCs, Microsoft Offers Workarounds
A glitch in Microsoft's Windows 10 update is causing systems to freeze after users tried to use the System Reboot function. Luckily, workarounds exist.
β Sharing Threat Intelligence: Time for an Overhaul β
π Read
via "Threatpost".
All too often, information-sharing is limited to vertical market silos; to build better defenses, it's time to take a broader view beyond the ISAC.π Read
via "Threatpost".
Threat Post
Sharing Threat Intelligence: Time for an Overhaul
All too often, information-sharing is limited to vertical market silos; to build better defenses, it's time to take a broader view beyond the ISAC.
π΄ New Trickbot Variant Uses URL Redirection to Spread π΄
π Read
via "Dark Reading: ".
Switch in tactic is the latest attempt by operators of the prolific banking Trojan to slip past detection mechanisms.π Read
via "Dark Reading: ".
Darkreading
New Trickbot Variant Uses URL Redirection to Spread
Switch in tactic is the latest attempt by operators of the prolific banking Trojan to slip past detection mechanisms.
π΄ DHS Warns of Data Theft via Chinese-Made Drones π΄
π Read
via "Dark Reading: ".
The drones are reportedly built with parts that can compromise organizations' data and share it on a server accessible to the Chinese government.π Read
via "Dark Reading: ".
Dark Reading
DHS Warns of Data Theft via Chinese-Made Drones
The drones are reportedly built with parts that can compromise organizations' data and share it on a server accessible to the Chinese government.
π΄ TeamViewer Admits Breach from 2016 π΄
π Read
via "Dark Reading: ".
The company says it stopped the attack launched by a Chinese hacking group.π Read
via "Dark Reading: ".
Darkreading
TeamViewer Admits Breach from 2016
The company says it stopped the attack launched by a Chinese hacking group.
π΄ Think Data Security, Not Endpoint Security π΄
π Read
via "Dark Reading: ".
A strong data protection strategy is essential to protect information as it moves across endpoints and in the cloud.π Read
via "Dark Reading: ".
Dark Reading
Think Data Security, Not Endpoint Security
A strong data protection strategy is essential to protect information as it moves across endpoints and in the cloud.
β WordPress plugin sees second serious security bug in six weeks β
π Read
via "Naked Security".
Researchers have uncovered another serious bug in WP Live Chat that could lead to the mass compromise of websites.π Read
via "Naked Security".
Naked Security
WordPress plugin sees second serious security bug in six weeks
Researchers have uncovered another serious bug in WP Live Chat that could lead to the mass compromise of websites.
β Rats leave the sinking ship as hackersβ forum gets hacked β
π Read
via "Naked Security".
The OGUsers forum, which trades in hijacked social accounts, has been hacked, its hard drives wiped, and its user database published online.π Read
via "Naked Security".
Naked Security
Rats leave the sinking ship as hackersβ forum gets hacked
The OGUsers forum, which trades in hijacked social accounts, has been hacked, its hard drives wiped, and its user database published online.
β Amnesty sues maker of Pegasus, the spyware let in by WhatsApp zero day β
π Read
via "Naked Security".
Amnesty International, which was sent the Pegasus spyware via a WhatsApp message, is seeking to stop NSO Groupβs "web of surveillance."π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Data Security: Think Beyond the Endpoint π΄
π Read
via "Dark Reading: ".
A strong data protection strategy is essential as data moves across endpoints and in the cloud.π Read
via "Dark Reading: ".
Dark Reading
Data Security: Think Beyond the Endpoint
A strong data protection strategy is essential as data moves across endpoints and in the cloud.
π Why post-quantum encryption will be critical to protect current classical computers π
π Read
via "Security on TechRepublic".
Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.π Read
via "Security on TechRepublic".
TechRepublic
Why post-quantum encryption will be critical to protect current classical computers
Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.
β Deep Packet Inspection a threat to net neutrality, say campaigners β
π Read
via "Naked Security".
Europeβs biggest ISPs and mobile operators are accused of undermining net neutrality rules and user privacy with their use of DPI.π Read
via "Naked Security".
Naked Security
Deep Packet Inspection a threat to net neutrality, say campaigners
Europeβs biggest ISPs and mobile operators are accused of undermining net neutrality rules and user privacy with their use of DPI.
π΄ Old Threats Are New Again π΄
π Read
via "Dark Reading: ".
They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.π Read
via "Dark Reading: ".
Darkreading
Old Threats Are New Again
They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.
π Massive DDoS attacks lasting more than an hour increased 487% in 2019 π
π Read
via "Security on TechRepublic".
After decreasing in 2018, the number of DDoS attacks jumped up in Q1 2019, according to Kaspersky Lab. Here's how to stay safe.π Read
via "Security on TechRepublic".
TechRepublic
Massive DDoS attacks lasting more than an hour increased 487% in 2019
After decreasing in 2018, the number of DDoS attacks jumped up in Q1 2019, according to Kaspersky Lab. Here's how to stay safe.
β Millions of Golfers Land in Privacy Hazard After Cloud Misconfig β
π Read
via "Threatpost".
A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see.π Read
via "Threatpost".
Threat Post
Millions of Golfers Land in Privacy Hazard After Cloud Misconfig
A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see.
β HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak β
π Read
via "Threatpost".
HCL domain pages exposed sensitive data - including passwords and project analysis reports - for thousands of employees and customers.π Read
via "Threatpost".
Threat Post
HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak
HCL domain pages exposed sensitive data - including passwords and project analysis reports - for thousands of employees and customers.