ATENTIONβΌ New - CVE-2015-9270
π Read
via "National Vulnerability Database".
XSS exists in the the-holiday-calendar plugin before 1.11.3 for WordPress via the thc-month parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9269
π Read
via "National Vulnerability Database".
The export/content.php exportarticle feature in the wordpress-mobile-pack plugin before 2.1.3 2015-06-03 for WordPress allows remote attackers to obtain sensitive information because the content of a privately published post is sent in JSON format.π Read
via "National Vulnerability Database".
π Why Australia is quickly developing a technology-based human rights problem π
π Read
via "Security on TechRepublic".
Human rights advocates have called on the Australian government to protect the rights of all in an era of change, saying tech should serve humanity, not exclude the most vulnerable members of society.π Read
via "Security on TechRepublic".
TechRepublic
Why Australia is quickly developing a technology-based human rights problem
Human rights advocates have called on the Australian government to protect the rights of all in an era of change, saying tech should serve humanity, not exclude the most vulnerable members of society.
β Students swap data for coffee at cashless cafe β
π Read
via "Naked Security".
In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.π Read
via "Naked Security".
Naked Security
Students swap data for coffee at cashless cafe
In this US-based cashless cafe, university students hand over personal data in exchange for a dose of caffeine and sponsorship propaganda.
β Suspect forced to unlock iPhone with his face β
π Read
via "Naked Security".
The order so far hasn't raised Fifth Amendment objections either, your face being something you are, rather than something you know.π Read
via "Naked Security".
Naked Security
Suspect forced to unlock iPhone with his face
The order so far hasnβt raised Fifth Amendment objections either, your face being something you are, rather than something you know.
β Lock screen bypass already discovered for Appleβs iOS 12 β
π Read
via "Naked Security".
Appleβs iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a deviceβs contents.π Read
via "Naked Security".
Naked Security
Lock screen bypass already discovered for Appleβs iOS 12
Appleβs iOS 12 is barely out of the gates and already someone has found a way to beat its lock screen security to access a deviceβs contents.
β Hackers demand ransom from hijacked Instagram influencers β
π Read
via "Naked Security".
Hackers are taking over high-profile Instagram usersβ accounts and holding them to ransom, revealed reports this week.π Read
via "Naked Security".
Naked Security
Hackers demand ransom from hijacked Instagram influencers
Hackers are taking over high-profile Instagram usersβ accounts and holding them to ransom, revealed reports this week.
β ThreatList: Password Hygiene Remains Lackluster in Global Businesses β
π Read
via "The first stop for security news | Threatpost ".
Password-sharing persists, but at least multifactor authentication usage is up.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Password Hygiene Remains Lackluster in Global Businesses
Password-sharing persists, but at least multifactor authentication usage is up.
β Google Cracks Down on Malicious Chrome Extensions in Major Update β
π Read
via "The first stop for security news | Threatpost ".
Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Google Cracks Down on Malicious Chrome Extensions in Major Update
Starting today, extensions with obfuscated code are banned and developers must go through a stricter extensions review process.
π΄ CISOs: How to Answer the 5 Questions Boards Will Ask You π΄
π Read
via "Dark Reading: ".
As boards learn the importance of cybersecurity, certain issues arise on a regular basis. These tips can help you address them.π Read
via "Dark Reading: ".
Dark Reading
CISOs: How to Answer the 5 Questions Boards Will Ask You
As boards learn the importance of cybersecurity, certain issues arise on a regular basis. These tips can help you address them.
β Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration β
π Read
via "The first stop for security news | Threatpost ".
The free online office suite software is used by more than 30 million people and is a ripe target for criminals.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
The free online office suite software is used by more than 30 million people and is a ripe target for criminals.
π The dark web is not actually selling your data, report says π
π Read
via "Security on TechRepublic".
While many reports have surfaced about the danger of company data being sold on the dark web, this information is actually misleading and inaccurate.π Read
via "Security on TechRepublic".
TechRepublic
Publicity surrounding data sold on the dark web isn't always accurate
While many reports have surfaced about the danger of company data being sold on the dark web, this information is actually misleading and inaccurate.
π SAP's 'Bring Your Own Node' service makes blockchain network integration easier π
π Read
via "Security on TechRepublic".
SAP announced new integration services and two new consortium groups at TechEd Las Vegas.π Read
via "Security on TechRepublic".
TechRepublic
SAP's new service makes blockchain network integration easier
SAP announced new network extensibility services and two new consortium groups at TechEd Las Vegas.
π΄ Stop Saying 'Digital Pearl Harbor' π΄
π Read
via "Dark Reading: ".
Yes, there are serious dangers posed by malevolent nation-states. But the hype is distracting us from the reality of the threats.π Read
via "Dark Reading: ".
Darkreading
Stop Saying 'Digital Pearl Harbor'
Yes, there are serious dangers posed by malevolent nation-states. But the hype is distracting us from the reality of the threats.
β Google Patches Critical Vulnerabilities in Android OS β
π Read
via "The first stop for security news | Threatpost ".
The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Google Patches Critical Vulnerabilities in Android OS
The most dire vulnerability targets the Android framework and could allow an adversary to execute arbitrary code on targeted devices.
π΄ The Award for Most Dangerous Celebrity Goes To ... π΄
π Read
via "Dark Reading: ".
A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.π Read
via "Dark Reading: ".
Darkreading
The Award for Most Dangerous Celebrity Goes To β¦
A new study highlights which celebrities are associated with the most malicious websites, making them risky search subjects.
β NOKKI Malware Sports Mysterious Link to Reaper APT Group β
π Read
via "The first stop for security news | Threatpost ".
The relationship between the malware and the APT group remains somewhat murky.π Read
via "The first stop for security news | Threatpost ".
Threat Post
NOKKI Malware Sports Mysterious Link to Reaper APT Group
The relationship between the malware and the APT group remains somewhat murky.
π΄ Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements π΄
π Read
via "Dark Reading: ".
Two felony counts each carry a maximum 10-year prison sentence.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
π΄ Sharpen Your Security Skills at Black Hat Trainings Chicago! π΄
π Read
via "Dark Reading: ".
Black Hat is bringing its highly-regarded Trainings to Chicago next month, October 22 and 23.Don't miss this opportunity to develop your skills in some of the most technical, hands-on security courses available.π Read
via "Dark Reading: ".
Dark Reading
Sharpen Your Security Skills at Black Hat Trainings Chicago! - Dark Reading
Black Hat is bringing its highly-regarded Trainings to Chicago next month, October 22 and 23.Don't miss this opportunity to develop your skills in some of the most technical, hands-on security courses available.
β Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws β
π Read
via "The first stop for security news | Threatpost ".
Foxit Software has patched over 100 vulnerabilities in its popular Foxit PDF Reader. Many of the bugs tackled by the company include a wide array of high severity remote code execution vulnerabilities. Foxit on Friday released fixes for Foxit Reader 9.3 and Foxit PhantomPDF 9.3, which addressed a whopping 124 vulnerabilities. Itβs important to note [β¦]π Read
via "The first stop for security news | Threatpost ".
Threat Post
Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws
Foxit users should update to Reader 9.3 and Foxit PhantomPDF 9.3 to fix the more than 100 vulnerabilities.