β Amnesty sues maker of Pegasus, the spyware let in by WhatsApp zero day β
π Read
via "Naked Security".
Amnesty International, which was sent the Pegasus spyware via a WhatsApp message, is seeking to stop NSO Groupβs "web of surveillance."π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ Data Security: Think Beyond the Endpoint π΄
π Read
via "Dark Reading: ".
A strong data protection strategy is essential as data moves across endpoints and in the cloud.π Read
via "Dark Reading: ".
Dark Reading
Data Security: Think Beyond the Endpoint
A strong data protection strategy is essential as data moves across endpoints and in the cloud.
π Why post-quantum encryption will be critical to protect current classical computers π
π Read
via "Security on TechRepublic".
Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.π Read
via "Security on TechRepublic".
TechRepublic
Why post-quantum encryption will be critical to protect current classical computers
Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.
β Deep Packet Inspection a threat to net neutrality, say campaigners β
π Read
via "Naked Security".
Europeβs biggest ISPs and mobile operators are accused of undermining net neutrality rules and user privacy with their use of DPI.π Read
via "Naked Security".
Naked Security
Deep Packet Inspection a threat to net neutrality, say campaigners
Europeβs biggest ISPs and mobile operators are accused of undermining net neutrality rules and user privacy with their use of DPI.
π΄ Old Threats Are New Again π΄
π Read
via "Dark Reading: ".
They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.π Read
via "Dark Reading: ".
Darkreading
Old Threats Are New Again
They may look familiar to you, and that isn't a coincidence. New threats are often just small twists on old ones.
π Massive DDoS attacks lasting more than an hour increased 487% in 2019 π
π Read
via "Security on TechRepublic".
After decreasing in 2018, the number of DDoS attacks jumped up in Q1 2019, according to Kaspersky Lab. Here's how to stay safe.π Read
via "Security on TechRepublic".
TechRepublic
Massive DDoS attacks lasting more than an hour increased 487% in 2019
After decreasing in 2018, the number of DDoS attacks jumped up in Q1 2019, according to Kaspersky Lab. Here's how to stay safe.
β Millions of Golfers Land in Privacy Hazard After Cloud Misconfig β
π Read
via "Threatpost".
A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see.π Read
via "Threatpost".
Threat Post
Millions of Golfers Land in Privacy Hazard After Cloud Misconfig
A database with millions of data points on games played plus sensitive information was left right in the middle of the internet fairway for all to see.
β HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak β
π Read
via "Threatpost".
HCL domain pages exposed sensitive data - including passwords and project analysis reports - for thousands of employees and customers.π Read
via "Threatpost".
Threat Post
HCL Exposes Customer, Personnel Info in Wide-Ranging Data Leak
HCL domain pages exposed sensitive data - including passwords and project analysis reports - for thousands of employees and customers.
π Your data, stolen twice: Pirated phishing kit contains hidden backdoor π
π Read
via "Security on TechRepublic".
A commercial phishing platform that targets Apple users has proven popular enough for other criminals to pirate, though the pirated version transmits harvested data through a hidden back channel.π Read
via "Security on TechRepublic".
TechRepublic
Your data, stolen twice: Pirated phishing kit contains hidden backdoor
A commercial phishing platform that targets Apple users has proven popular enough for other criminals to pirate, though the pirated version transmits harvested data through a hidden back channel.
π How to improve cloud provider security: 4 tips π
π Read
via "Security on TechRepublic".
Many IT pros remain concerned with the risk of data loss and leakage in the cloud, according to a new survey from AlgoSec.π Read
via "Security on TechRepublic".
TechRepublic
How to improve cloud provider security: 4 tips
Many IT pros remain concerned with the risk of data loss and leakage in the cloud, according to a new survey from AlgoSec.
β Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable β
π Read
via "Threatpost".
A flaw in the Secure Boot trusted hardware root-of-trust affects enterprise, military and government network gear, including routers, switches and firewalls.π Read
via "Threatpost".
Threat Post
Cisco Starts Patching Firmware Bug; Millions of Devices Still Vulnerable
A flaw in the Secure Boot trusted hardware root-of-trust affects enterprise, military and government network gear, including routers, switches and firewalls.
π΄ KnowBe4 Focuses on Security Culture with CLTRe Acquisition π΄
π Read
via "Dark Reading: ".
The acquisition solidifies KnowBe4's European presence and shows a focus on building and measuring security culture.π Read
via "Dark Reading: ".
Darkreading
KnowBe4 Focuses on Security Culture with CLTRe Acquisition
The acquisition solidifies KnowBe4's European presence and shows a focus on building and measuring security culture.
π΄ To Narrow the Cyber Skills Gap with Attackers, Cut the Red Tape π΄
π Read
via "Dark Reading: ".
Attackers are getting further ahead, and entrenched corporate rules shoulder much of the blame.π Read
via "Dark Reading: ".
Darkreading
To Narrow the Cyber Skills Gap with Attackers, Cut the Red Tape
Attackers are getting further ahead, and entrenched corporate rules shoulder much of the blame.
π Half A Million DPOs in Place One Year Post-GDPR π
π Read
via "Subscriber Blog RSS Feed ".
One year after GDPR was first implemented, an estimated 500,000 organizations have registered data protection officers in place.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Half A Million DPOs in Place One Year Post-GDPR
One year after GDPR was first implemented, an estimated 500,000 organizations in Europe have registered data protection officers in place.
π΄ 49 Million Instagram Influencer Records Exposed in Open Database π΄
π Read
via "Dark Reading: ".
An AWS-hosted database was configured with no username or password required for access to personal data.π Read
via "Dark Reading: ".
Dark Reading
49 Million Instagram Influencer Records Exposed in Open Database
An AWS-hosted database was configured with no username or password required for access to personal data.
β Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter β
π Read
via "Threatpost".
Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world.π Read
via "Threatpost".
Threat Post
Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter
Enjoy the video replay of the recent Threatpost cloud security webinar, featuring a panel of experts offering best practices and ideas for managing data in a cloudified world.
β Intel Fixes Critical, High-Severity Flaws Across Several Products β
π Read
via "Threatpost".
Intel has issued fixes for a slew of vulnerabilities, separate from the side-channel bugs disclosed last week.π Read
via "Threatpost".
Threat Post
Intel Fixes Critical, High-Severity Flaws Across Several Products
Intel has issued fixes for a slew of vulnerabilities, separate from the side-channel bugs disclosed last week.
π Why post-quantum encryption will be critical to protect current classical computers π
π Read
via "Security on TechRepublic".
Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.π Read
via "Security on TechRepublic".
TechRepublic
Why post-quantum encryption will be critical to protect current classical computers
Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.
β Mozilla Tackles Two Critical Flaws with Firefox 67 Release β
π Read
via "Threatpost".
Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox, which touts better speed and privacy.π Read
via "Threatpost".
Threat Post
Mozilla Tackles Two Critical Flaws with Firefox 67 Release
Mozilla has released a host of fixes for its browser as it rolls out its latest 67 version of Firefox that touts better speed and privacy.
π΄ Satan Ransomware Adds More Evil Tricks π΄
π Read
via "Dark Reading: ".
The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.π Read
via "Dark Reading: ".
Darkreading
Satan Ransomware Adds More Evil Tricks
The latest changes to the Satan ransomware framework demonstrate attackers are changing their operations while targeting victims more carefully.
π How to change the complexity of your Windows PIN π
π Read
via "Security on TechRepublic".
Learn how to create a Windows PIN with more than four digits.π Read
via "Security on TechRepublic".
TechRepublic
How to change the complexity of your Windows PIN
Learn how to create a Windows PIN with more than four digits.