π Blockchain for drugs: IBM, Walmart pilot prescription medication tracking π
π Read
via "Security on TechRepublic".
KPMG and Merck are among the companies that will collaborate in an FDA program to evaluate using blockchain to protect pharmaceutical products.π Read
via "Security on TechRepublic".
TechRepublic
Blockchain for drugs: IBM, Walmart pilot prescription medication tracking
KPMG and Merck are among the companies that will collaborate in an FDA program to evaluate using blockchain to protect pharmaceutical products.
π Blockchain projects: 7 mistakes to avoid π
π Read
via "Security on TechRepublic".
Successful blockchain projects require CIOs to be aware of the technology's capabilities and limitations, according to Gartner.π Read
via "Security on TechRepublic".
TechRepublic
Blockchain projects: 7 mistakes to avoid
Successful blockchain projects require CIOs to be aware of the technology's capabilities and limitations, according to Gartner.
π΄ Black Hat Q&A: Defending Against Cheaper, Accessible 'Deepfake' Tech π΄
π Read
via "Dark Reading: ".
ZeroFox's Matt and Mike Price discuss their work researching cybersecurity responses to the rising tide of 'deepfake' videos.π Read
via "Dark Reading: ".
Dark Reading
Black Hat Q&A: Defending Against Cheaper, Accessible 'Deepfake' Tech
ZeroFox's Matt and Mike Price discuss their work researching cybersecurity responses to the rising tide of 'deepfake' videos.
β High-Severity Cisco Flaw in IOS XE Enables Device Takeover β
π Read
via "Threatpost".
A high-severity flaw could give attackers full control of Cisco routers or switches.π Read
via "Threatpost".
Threat Post
High-Severity Cisco Flaw in IOS XE Enables Device Takeover
A high-severity flaw could give attackers full control of Cisco routers or switches.
β Vim devs fix system-pwning text editor bug β
π Read
via "Naked Security".
Diehard text editor users everywhere breathed a sigh of relief this week as the open source community fixed a bug in one of the most venerable *nix programs: Vim.π Read
via "Naked Security".
Naked Security
Vim devs fix system-pwning text editor bug
Diehard text editor users everywhere breathed a sigh of relief this week as the open source community fixed a bug in one of the most venerable *nix programs: Vim.
π Ransomware rebounding in popularity as cryptojacking loses steam π
π Read
via "Security on TechRepublic".
Hackers are going back to the tried-and-true method of simply demanding ransoms be paid in cryptocurrencies, rather than trying to covertly mine them.π Read
via "Security on TechRepublic".
TechRepublic
Ransomware rebounding in popularity as cryptojacking loses steam
Hackers are going back to the tried-and-true method of simply demanding ransoms be paid in cryptocurrencies, rather than trying to covertly mine them.
β Backpacker claims to find a network of hidden webcams in farm stay β
π Read
via "Naked Security".
In the bug repellent gizmo, in the shower, in the little birds glued to the footboardβall hiding webcams, alleges the Dutch backpacker.π Read
via "Naked Security".
Naked Security
Backpacker claims to find a network of hidden webcams in farm stay
In the bug repellent gizmo, in the shower, in the little birds glued to the footboardβall hiding webcams, alleges the Dutch backpacker.
β Facebook keeps deepfake of Mark Zuckerberg β
π Read
via "Naked Security".
"Whoever controls the data, controls the future," says the evil Zuck, who, according to the platform's current policy, won't be taken down.π Read
via "Naked Security".
Naked Security
Facebook keeps deepfake of Mark Zuckerberg
βWhoever controls the data, controls the future,β says the evil Zuck, who, according to the platformβs current policy, wonβt be taken down.
π΄ The Rise of "Purple Teaming" π΄
π Read
via "Dark Reading: ".
The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.π Read
via "Dark Reading: ".
Dark Reading
The Rise of Purple Teaming
The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.
β Telegram CEO Fingers China State Actors for DDoS Attack β
π Read
via "Threatpost".
Durov took to Twitter to hint that Beijing tried to take Telegram offline to disrupt the Hong Kong protests.π Read
via "Threatpost".
Threat Post
Telegram CEO Fingers China State Actors for DDoS Attack
Durov took to Twitter to hint that Beijing tried to take Telegram offline to disrupt the Hong Kong protests.
π΄ The Rise of "Purple Teaming" π΄
π Read
via "Dark Reading: ".
The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.π Read
via "Dark Reading: ".
Dark Reading
The Rise of 'Purple Teaming'
The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team.
π Magecart attack: What it is, how it works, and how to prevent it π
π Read
via "Security on TechRepublic".
Learn how to combat this web-based card skimming attack.π Read
via "Security on TechRepublic".
TechRepublic
Magecart attack: What it is, how it works, and how to prevent it
Learn how to combat this web-based card skimming attack.
π΄ Google Adds Two-Factor Authentication For Its Apps on iOS π΄
π Read
via "Dark Reading: ".
Android-based two-factor authentication now works for Google applications on iPad and iPhone.π Read
via "Dark Reading: ".
Dark Reading
Google Adds Two-Factor Authentication For Its Apps on iOS
Android-based two-factor authentication now works for Google applications on iPad and iPhone.
π΄ 7 Truths About BEC Scams π΄
π Read
via "Dark Reading: ".
Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.π Read
via "Dark Reading: ".
Darkreading
7 Truths About BEC Scams
Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.
π΄ The CISO's Drive to Consolidation π΄
π Read
via "Dark Reading: ".
Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.π Read
via "Dark Reading: ".
Dark Reading
The CISO's Drive to Consolidation
Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started.
ATENTIONβΌ New - CVE-2018-12147
π Read
via "National Vulnerability Database".
Insufficient input validation in HECI subsystem in Intel(R) CSME before version 11.21.55, Intel? Server Platform Services before version 4.0 and Intel? Trusted Execution Engine Firmware before version 3.1.55 may allow a privileged user to potentially enable escalation of privileges via local access.π Read
via "National Vulnerability Database".
π Hospital medical equipment contains potentially lethal vulnerability π
π Read
via "Security on TechRepublic".
A vulnerability in the Windows CE-powered Alaris Gateway Workstation allows attackers to modify dosage rates for infusion pumps, which can have lethal results.π Read
via "Security on TechRepublic".
TechRepublic
Hospital medical equipment contains potentially lethal vulnerability
A vulnerability in the Windows CE-powered Alaris Gateway Workstation allows attackers to modify dosage rates for infusion pumps, which can have lethal results.
β Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk β
π Read
via "Threatpost".
The critical bug in a connected medical device can allow an attacker to remotely manipulate hospital pumps, either to withhold meds or dispense too much.π Read
via "Threatpost".
Threat Post
Max-Severity Bug in Infusion Pump Gateway Puts Lives at Risk
The critical bug in a connected medical device can allow an attacker to remotely manipulate hospital pumps, either to withhold meds or dispense too much.
β Evernote Critical Flaw Opened Personal Data of Millions to Attack β
π Read
via "Threatpost".
Evernote's web clipper extension for Chrome is vulnerable to a critical flaw that could have exposed the data of more than 4.6 million users.π Read
via "Threatpost".
Threat Post
Evernote Critical Flaw Opened Personal Data of Millions to Attack
Evernote's web clipper extension for Chrome is vulnerable to a critical flaw that could have exposed the data of more than 4.6 million users.
π New IoT Security Bill Passes Another Hurdle π
π Read
via "Subscriber Blog RSS Feed ".
A bill to help strengthen the Wild West of the Internet world - the internet of things (IoT) - advanced this week.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New IoT Security Bill Passes Another Hurdle
A bill to help strengthen the Wild West of the Internet world - the internet of things (IoT) - advanced this week.
π΄ Congress Gives 'Hack Back' Legislation Another Try π΄
π Read
via "Dark Reading: ".
Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks.π Read
via "Dark Reading: ".
Darkreading
Congress Gives 'Hack Back' Legislation Another Try
Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks.