π΄ The Right Diagnosis: A Cybersecurity Perspective π΄
π Read
via "Dark Reading: ".
A healthy body and a healthy security organization have a lot more in common than most people think.π Read
via "Dark Reading: ".
Darkreading
The Right Diagnosis: A Cybersecurity Perspective
A healthy body and a healthy security organization have a lot more in common than most people think.
β How to have that difficult βstay safe onlineβ conversation with your kids β
π Read
via "Naked Security".
As your children start using the internet with greater independence, help keep them - and their data - safe with these simple tips.π Read
via "Naked Security".
Naked Security
How to have that difficult βstay safe onlineβ conversation with your kids
As your children start using the internet with greater independence, help keep them β and their data β safe with these simple tips.
π Despite digital growth, 25% of SMBs still track finances on paper π
π Read
via "Security on TechRepublic".
Companies are putting their finances and security at risk by not using digital-based tracking, according to a Clutch report.π Read
via "Security on TechRepublic".
TechRepublic
Despite digital growth, 25% of SMBs still track finances on paper
Companies are putting their finances and security at risk by not using digital-based tracking, according to a Clutch report.
π΄ Employees Share Average of 6 Passwords With Co-Workers π΄
π Read
via "Dark Reading: ".
Password-sharing and reuse is still prominent, but mulit-factor authentication is on the rise, new study shows.π Read
via "Dark Reading: ".
Dark Reading
Employees Share Average of 6 Passwords With Co-Workers
Password-sharing and reuse is still prominent, but mulit-factor authentication is on the rise, new study shows.
π΄ California Enacts First-in-Nation IoT Security Law π΄
π Read
via "Dark Reading: ".
The new law requires some form of authentication for most connected devices.π Read
via "Dark Reading: ".
Dark Reading
California Enacts First-in-Nation IoT Security Law
The new law requires some form of authentication for most connected devices.
β California, U.S. Government Battle Over Net Neutrality State Law β
π Read
via "The first stop for security news | Threatpost ".
The Department of Justice has filed a lawsuit after SB 822 was passed, enforcing net neutrality laws, on Sunday.π Read
via "The first stop for security news | Threatpost ".
Threat Post
California, U.S. Government Battle Over Net Neutrality State Law
The Department of Justice has filed a lawsuit after SB 822 was passed, enforcing net neutrality laws, on Sunday.
π Top 5 things to know about voting and the blockchain π
π Read
via "Security on TechRepublic".
From security to anonymity, here are the top 5 things you should know about blockchain and voting.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about voting and the blockchain
From security to anonymity, here are the top 5 things you should know about blockchain and voting.
β Nine NAS Bugs Open LenovoEMC, Iomega Devices to Attack β
π Read
via "The first stop for security news | Threatpost ".
Rated as high-risk vulnerabilities, these privilege-escalation flaws could allow an unauthenticated attacker to access protected content.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Nine NAS Bugs Open LenovoEMC, Iomega Devices to Attack
Rated as high-risk vulnerabilities, these privilege-escalation flaws could allow an unauthenticated attacker to access protected content.
π΄ October Events at Dark Reading You Can't Miss π΄
π Read
via "Dark Reading: ".
Cybersecurity Month at Dark Reading is packed with educational webinars, from data breach response to small business security.π Read
via "Dark Reading: ".
Darkreading
October Events at Dark Reading You Can't Miss
Cybersecurity Month at Dark Reading is packed with educational webinars, from data breach response to small business security.
β Adobe Patches 47 Critical Flaws in Acrobat and DC β
π Read
via "The first stop for security news | Threatpost ".
The update includes a security bypass bug that enables privilege escalation.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Adobe Patches 47 Critical Flaws in Acrobat and DC
The update includes a security bypass bug that enables privilege escalation.
π΄ 'Short, Brutal Lives': Life Expectancy for Malicious Domains π΄
π Read
via "Dark Reading: ".
Using a cooling-off period for domain names can help catch those registered by known bad actors.π Read
via "Dark Reading: ".
Darkreading
'Short, Brutal Lives': Life Expectancy for Malicious Domains
Using a cooling-off period for domain names can help catch those registered by known bad actors.
π΄ 'Short, Brutal Lives': Life Expectancy for Malicious Domains π΄
π Read
via "Dark Reading: ".
Using a cooling-off period for domain names can help catch those registered by known bad actors.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2015-9270
π Read
via "National Vulnerability Database".
XSS exists in the the-holiday-calendar plugin before 1.11.3 for WordPress via the thc-month parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9269
π Read
via "National Vulnerability Database".
The export/content.php exportarticle feature in the wordpress-mobile-pack plugin before 2.1.3 2015-06-03 for WordPress allows remote attackers to obtain sensitive information because the content of a privately published post is sent in JSON format.π Read
via "National Vulnerability Database".
π Why Australia is quickly developing a technology-based human rights problem π
π Read
via "Security on TechRepublic".
Human rights advocates have called on the Australian government to protect the rights of all in an era of change, saying tech should serve humanity, not exclude the most vulnerable members of society.π Read
via "Security on TechRepublic".
TechRepublic
Why Australia is quickly developing a technology-based human rights problem
Human rights advocates have called on the Australian government to protect the rights of all in an era of change, saying tech should serve humanity, not exclude the most vulnerable members of society.
β Students swap data for coffee at cashless cafe β
π Read
via "Naked Security".
In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.π Read
via "Naked Security".
Naked Security
Students swap data for coffee at cashless cafe
In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.
β Suspect forced to unlock iPhone with his face β
π Read
via "Naked Security".
The order so far hasn't raised Fifth Amendment objections either, your face being something you are, rather than something you know.π Read
via "Naked Security".
Naked Security
Suspect forced to unlock iPhone with his face
The order so far hasnβt raised Fifth Amendment objections either, your face being something you are, rather than something you know.
β Lock screen bypass already discovered for Appleβs iOS 12 β
π Read
via "Naked Security".
Appleβs iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a deviceβs contents.π Read
via "Naked Security".
Naked Security
Lock screen bypass already discovered for Appleβs iOS 12
Appleβs iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a deviceβs contents.
β Hackers demand ransom from hijacked Instagram influencers β
π Read
via "Naked Security".
Hackers are taking over high-profile Instagram usersβ accounts and holding them to ransom, revealed reports this week.π Read
via "Naked Security".
Naked Security
Hackers demand ransom from hijacked Instagram influencers
Hackers are taking over high-profile Instagram usersβ accounts and holding them to ransom, revealed reports this week.
β ThreatList: Password Hygiene Remains Lackluster in Global Businesses β
π Read
via "The first stop for security news | Threatpost ".
Password-sharing persists, but at least multifactor authentication usage is up.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Password Hygiene Remains Lackluster in Global Businesses
Password-sharing persists, but at least multifactor authentication usage is up.
β Google Cracks Down on Malicious Chrome Extensions in Major Update β
π Read
via "The first stop for security news | Threatpost ".
Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Google Cracks Down on Malicious Chrome Extensions in Major Update
Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.