π GDPR: A cheat sheet π
π Read
via "Security on TechRepublic".
Enforcement of the EU General Data Protection Regulation (GDPR) applies to any company that transacts with European Union citizens. Here's your GDPR go-to guide.π Read
via "Security on TechRepublic".
TechRepublic
GDPR: A cheat sheet
Enforcement of the EU General Data Protection Regulation (GDPR) applies to any company that transacts with European Union citizens. Here's your GDPR go-to guide.
β Google Ad Exchange in data privacy probe β
π Read
via "Naked Security".
It was triggered by a complaint filed by Dr. Johnny Ryan, CPO of privacy-focused Brave browser, which is fighting Google's search domination.π Read
via "Naked Security".
Naked Security
Google Ad Exchange in data privacy probe
It was triggered by a complaint filed by Dr. Johnny Ryan, CPO of privacy-focused Brave browser, which is fighting Googleβs search domination.
β Batterygate news: Apple to warn users if iOS updates throttle iPhones β
π Read
via "Naked Security".
Competition regulators investigated Apple due to concerns that people were needlessly repairing or replacing slow phones.π Read
via "Naked Security".
Naked Security
Batterygate news: Apple to warn users if iOS updates throttle iPhones
Competition regulators investigated Apple due to concerns that people were needlessly repairing or replacing slow phones.
β Safari test points to a future with tracker-free ads β
π Read
via "Naked Security".
Apple thinks it has come up with a way for advertisers to track how well their ads are doing without compromising user privacy.π Read
via "Naked Security".
Naked Security
Safari test points to a future with tracker-free ads
Apple thinks it has come up with a way for advertisers to track how well their ads are doing without compromising user privacy.
β Any advance on $1.2m for this virus-infested netbook? β
π Read
via "Naked Security".
Can you ever call malware art? That question is now up for debate as a Chinese internet artist puts a laptop full of viruses up for auction.π Read
via "Naked Security".
Naked Security
Any advance on $1.2m for this virus-infested netbook?
Can you ever call malware art? That question is now up for debate as a Chinese internet artist puts a laptop full of viruses up for auction.
π Nessus expands vulnerability scanner offerings to 16 IPs in commercial environments π
π Read
via "Security on TechRepublic".
Tenable introduced the free Nessus Essentials product, and also discussed the wisdom of building apps in Electron, along with fixes for Spectre and Meltdown.π Read
via "Security on TechRepublic".
TechRepublic
Nessus expands vulnerability scanner offerings to 16 IPs in commercial environments
Tenable introduced the free Nessus Essentials product, and also discussed the wisdom of building apps in Electron, along with fixes for Spectre and Meltdown.
π΄ 7 Recent Wins Against Cybercrime π΄
π Read
via "Dark Reading: ".
The increasing number of successful law enforcement actions and prosecutions suggest that cybercriminals have plenty of reason to be looking over their shoulders.π Read
via "Dark Reading: ".
Darkreading
7 Recent Wins Against Cybercrime
The increasing number of successful law enforcement actions and prosecutions suggest that cybercriminals have plenty of reason to be looking over their shoulders.
π΄ Master NSA-Grade Security Tools at New Black Hat Trainings Virginia π΄
π Read
via "Dark Reading: ".
Get ready, because this October Black Hat will bring its highly-regarded Trainings to Alexandria, Virginia for two days of intensive, practical cybersecurity education.π Read
via "Dark Reading: ".
Dark Reading
Master NSA-Grade Security Tools at New Black Hat Trainings Virginia
Get ready, because this October Black Hat will bring its highly-regarded Trainings to Alexandria, Virginia for two days of intensive, practical cybersecurity education.
β News Wrap: Which Companies Are Doing Privacy Right and Which Arenβt? β
π Read
via "Threatpost".
The Threatpost team breaks down the top privacy-related data incidents of the week - including data leaks from HCL and a golfing app - and highlights some surprisingly good privacy news.π Read
via "Threatpost".
Threat Post
News Wrap: Which Companies Are Doing Privacy Right and Which Arenβt?
The Threatpost team breaks down the top privacy-related data incidents of the week - including data leaks from HCL and a golfing app - and highlights some surprisingly good privacy news.
π Oh Canada: Why half of phishing attacks target the Great White North π
π Read
via "Security on TechRepublic".
Though phishing volume remained relatively stable, attacks against Canadian users dominate, according to an RSA report.π Read
via "Security on TechRepublic".
TechRepublic
Oh Canada: Why half of phishing attacks target the Great White North
Though phishing volume remained relatively stable, attacks against Canadian users dominate, according to an RSA report.
π΄ How Security Vendors Can Address the Cybersecurity Talent Shortage π΄
π Read
via "Dark Reading: ".
The talent gap is too large for any one sector, and cybersecurity vendors have a big role to play in helping to close it.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
π΄ Moody's Downgrade of Equifax: A Wake-up Call to Boards π΄
π Read
via "Dark Reading: ".
The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ NSS Labs Admits Its Test of CrowdStrike Falcon Was 'Inaccurate' π΄
π Read
via "Dark Reading: ".
CrowdStrike, NSS Labs reach confidential settlement over 2017 endpoint product testing dispute.π Read
via "Dark Reading: ".
Dark Reading
NSS Labs Admits Its Test of CrowdStrike Falcon Was 'Inaccurate'
CrowdStrike, NSS Labs reach confidential settlement over 2017 endpoint product testing dispute.
π΄ Mist Computing Startup Distributes Security AI to the Network Edge π΄
π Read
via "Dark Reading: ".
MistNet, founded by former Juniper employees, moves AI processing to the network edge to build distributed detection and analysis models for security.π Read
via "Dark Reading: ".
Dark Reading
Mist Computing Startup Distributes Security AI to the Network Edge
MistNet, founded by former Juniper employees, moves AI processing to the network edge to build distributed detection and analysis models for security.
β Microsoft Beefs Up Wi-Fi Protection β
π Read
via "Threatpost".
The Windows 10 update that's rolling out addresses insecure Wi-Fi hotspots with new user notifications.π Read
via "Threatpost".
Threat Post
Microsoft Beefs Up Wi-Fi Protection
The Windows 10 update that's rolling out addresses insecure Wi-Fi hotspots with new user notifications.
π Friday Five: 5/24 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Google's password faux pas, how real-time bidding may violate the GDPR, and tips on mitigating trade theft risk are all covered in this week's Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 5/24 Edition
Google's password faux pas, how real-time bidding may violate the GDPR, and tips on mitigating trade theft risk are all covered in this week's Friday Five.
β Joomla and WordPress Found Harboring Malicious Redirect Code β
π Read
via "Threatpost".
New .htaccess injector threat on Joomla and WordPress websites redirects to malicious websites.π Read
via "Threatpost".
Threat Post
Joomla and WordPress Found Harboring Malicious Redirect Code
New .htaccess injector threat on Joomla and WordPress websites redirects to malicious websites.
π What the future looks like as GDPR's one-year anniversary approaches π
π Read
via "Security on TechRepublic".
ZDNet's Danny Palmer sits down with TechRepublic's Karen Roby to break down exactly what GDPR is, what it does, and what the future looks like as its one-year anniversary approaches.π Read
via "Security on TechRepublic".
TechRepublic
What the future looks like as GDPR's one-year anniversary approaches
ZDNet's Danny Palmer sits down with TechRepublic's Karen Roby to break down exactly what GDPR is, what it does, and what the future looks like as its one-year anniversary approaches.
ATENTIONβΌ New - CVE-2016-8900
π Read
via "National Vulnerability Database".
Exponent CMS version 2.3.9 suffers from a Object Injection vulnerability in framework/modules/core/controllers/expTagController.php related to change_tags.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-8898
π Read
via "National Vulnerability Database".
Exponent CMS version 2.3.9 suffers from a sql injection vulnerability in framework/modules/ecommerce/controllers/cartController.php.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10245
π Read
via "National Vulnerability Database".
Insufficient sanitization of the query parameter in templates/html/search_opensearch.php could lead to reflected cross-site scripting or iframe injection.π Read
via "National Vulnerability Database".