β Adobe Patches 47 Critical Flaws in Acrobat and DC β
π Read
via "The first stop for security news | Threatpost ".
The update includes a security bypass bug that enables privilege escalation.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Adobe Patches 47 Critical Flaws in Acrobat and DC
The update includes a security bypass bug that enables privilege escalation.
π΄ 'Short, Brutal Lives': Life Expectancy for Malicious Domains π΄
π Read
via "Dark Reading: ".
Using a cooling-off period for domain names can help catch those registered by known bad actors.π Read
via "Dark Reading: ".
Darkreading
'Short, Brutal Lives': Life Expectancy for Malicious Domains
Using a cooling-off period for domain names can help catch those registered by known bad actors.
π΄ 'Short, Brutal Lives': Life Expectancy for Malicious Domains π΄
π Read
via "Dark Reading: ".
Using a cooling-off period for domain names can help catch those registered by known bad actors.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2015-9270
π Read
via "National Vulnerability Database".
XSS exists in the the-holiday-calendar plugin before 1.11.3 for WordPress via the thc-month parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9269
π Read
via "National Vulnerability Database".
The export/content.php exportarticle feature in the wordpress-mobile-pack plugin before 2.1.3 2015-06-03 for WordPress allows remote attackers to obtain sensitive information because the content of a privately published post is sent in JSON format.π Read
via "National Vulnerability Database".
π Why Australia is quickly developing a technology-based human rights problem π
π Read
via "Security on TechRepublic".
Human rights advocates have called on the Australian government to protect the rights of all in an era of change, saying tech should serve humanity, not exclude the most vulnerable members of society.π Read
via "Security on TechRepublic".
TechRepublic
Why Australia is quickly developing a technology-based human rights problem
Human rights advocates have called on the Australian government to protect the rights of all in an era of change, saying tech should serve humanity, not exclude the most vulnerable members of society.
β Students swap data for coffee at cashless cafe β
π Read
via "Naked Security".
In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.π Read
via "Naked Security".
Naked Security
Students swap data for coffee at cashless cafe
In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.
β Suspect forced to unlock iPhone with his face β
π Read
via "Naked Security".
The order so far hasn't raised Fifth Amendment objections either, your face being something you are, rather than something you know.π Read
via "Naked Security".
Naked Security
Suspect forced to unlock iPhone with his face
The order so far hasnβt raised Fifth Amendment objections either, your face being something you are, rather than something you know.
β Lock screen bypass already discovered for Appleβs iOS 12 β
π Read
via "Naked Security".
Appleβs iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a deviceβs contents.π Read
via "Naked Security".
Naked Security
Lock screen bypass already discovered for Appleβs iOS 12
Appleβs iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a deviceβs contents.
β Hackers demand ransom from hijacked Instagram influencers β
π Read
via "Naked Security".
Hackers are taking over high-profile Instagram usersβ accounts and holding them to ransom, revealed reports this week.π Read
via "Naked Security".
Naked Security
Hackers demand ransom from hijacked Instagram influencers
Hackers are taking over high-profile Instagram usersβ accounts and holding them to ransom, revealed reports this week.
β ThreatList: Password Hygiene Remains Lackluster in Global Businesses β
π Read
via "The first stop for security news | Threatpost ".
Password-sharing persists, but at least multifactor authentication usage is up.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Password Hygiene Remains Lackluster in Global Businesses
Password-sharing persists, but at least multifactor authentication usage is up.
β Google Cracks Down on Malicious Chrome Extensions in Major Update β
π Read
via "The first stop for security news | Threatpost ".
Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Google Cracks Down on Malicious Chrome Extensions in Major Update
Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.
π΄ CISOs: How to Answer the 5 Questions Boards Will Ask You π΄
π Read
via "Dark Reading: ".
As boards learn the importance of cybersecurity, certain issues arise on a regular basis. These tips can help you address them.π Read
via "Dark Reading: ".
Dark Reading
CISOs: How to Answer the 5 Questions Boards Will Ask You
As boards learn the importance of cybersecurity, certain issues arise on a regular basis. These tips can help you address them.
β Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration β
π Read
via "The first stop for security news | Threatpost ".
The free online office suite software is used by more than 30 million people and is a ripe target for criminals.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
The free online office suite software is used by more than 30 million people and is a ripe target for criminals.
π The dark web is not actually selling your data, report says π
π Read
via "Security on TechRepublic".
While many reports have surfaced about the danger of company data being sold on the dark web, this information is actually misleading and inaccurate.π Read
via "Security on TechRepublic".
TechRepublic
Publicity surrounding data sold on the dark web isn't always accurate
While many reports have surfaced about the danger of company data being sold on the dark web, this information is actually misleading and inaccurate.
π SAP's 'Bring Your Own Node' service makes blockchain network integration easier π
π Read
via "Security on TechRepublic".
SAP announced new integration services and two new consortium groups at TechEd Las Vegas.π Read
via "Security on TechRepublic".
TechRepublic
SAP's new service makes blockchain network integration easier
SAP announced new network extensibility services and two new consortium groups at TechEd Las Vegas.
π΄ Stop Saying 'Digital Pearl Harbor' π΄
π Read
via "Dark Reading: ".
Yes, there are serious dangers posed by malevolent nation-states. But the hype is distracting us from the reality of the threats.π Read
via "Dark Reading: ".
Darkreading
Stop Saying 'Digital Pearl Harbor'
Yes, there are serious dangers posed by malevolent nation-states. But the hype is distracting us from the reality of the threats.
β Google Patches Critical Vulnerabilities in Android OS β
π Read
via "The first stop for security news | Threatpost ".
The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Google Patches Critical Vulnerabilities in Android OS
The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.
π΄ The Award for Most Dangerous Celebrity Goes To ... π΄
π Read
via "Dark Reading: ".
A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.π Read
via "Dark Reading: ".
Darkreading
The Award for Most Dangerous Celebrity Goes To β¦
A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.
β NOKKI Malware Sports Mysterious Link to Reaper APT Group β
π Read
via "The first stop for security news | Threatpost ".
The relationship between the malware and the APT group remains somewhat murky.π Read
via "The first stop for security news | Threatpost ".
Threat Post
NOKKI Malware Sports Mysterious Link to Reaper APT Group
The relationship between the malware and the APT group remains somewhat murky.
π΄ Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements π΄
π Read
via "Dark Reading: ".
Two felony counts each carry a maximum 10-year prison sentence.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading