π Tech news roundup: FedEx sues DOC, skilled workers are in demand, and how companies stay relevant π
π Read
via "Security on TechRepublic".
This week's TechRepublic and ZDNet news stories include a Verizon error leads to massive outages, Apple's plan to hire 2,000 employees, and five ways robots impact our lives.π Read
via "Security on TechRepublic".
TechRepublic
Tech news roundup: FedEx sues DOC, skilled workers are in demand, and how companies stay relevant
This week's TechRepublic and ZDNet news stories include a Verizon error leads to massive outages, Apple's plan to hire 2,000 employees, and five ways robots impact our lives.
β EA Games Patches Account-Hijacking Bug β
π Read
via "Threatpost".
A bug in the Electronic Arts gaming platform's single sign-on mechanism could have allowed hackers to access game accounts.π Read
via "Threatpost".
Threat Post
EA Games Patches Account-Hijacking Bug
A bug in EA Gamesβ single sign-on mechanism could have allowed hackers to access game accounts.
π Docker containers are filled with vulnerabilities: Here's how the top 1,000 fared π
π Read
via "Security on TechRepublic".
An analysis of the 1,000 most popular Docker containers uncovered a variety of security vulnerabilities, some of which are critical.π Read
via "Security on TechRepublic".
TechRepublic
Docker containers are filled with vulnerabilities: Here's how the top 1,000 fared
An analysis of the 1,000 most popular Docker containers uncovered a variety of security vulnerabilities, some of which are critical.
π Tech news roundup: FedEx sues the DOC, skilled workers are in demand, and how companies stay relevant π
π Read
via "Security on TechRepublic".
This week's TechRepublic and ZDNet news stories include a Verizon error leads to massive outages, Apple's plan to hire 2,000 employees, and five ways robots impact our lives.π Read
via "Security on TechRepublic".
TechRepublic
Tech news roundup: FedEx sues the DOC, skilled workers are in demand, and how companies stay relevant
This week's TechRepublic and ZDNet news stories include a Verizon error leads to massive outages, Apple's plan to hire 2,000 employees, and five ways robots impact our lives.
π΄ Breaking the Endless Cycle of "Perfect" Cybercrimes π΄
π Read
via "Dark Reading: ".
A two-step strategy for creating an attack environment that is more complex, less profitable, and more likely to expose the attacker.π Read
via "Dark Reading: ".
Dark Reading
Breaking the Endless Cycle of Perfect Cybercrimes
A two-step strategy for creating an attack environment that is more complex, less profitable, and more likely to expose the attacker.
π How Texasβ New Data Breach Law Will Affect Businesses π
π Read
via "Subscriber Blog RSS Feed ".
Recent changes to data privacy legislation in the Lone Star State will likely affect the incident response plan of any business that does business in the state.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
How Texasβ New Data Breach Law Will Affect Businesses
Recent changes to data privacy legislation in the Lone Star State will likely affect the incident response plan of any company that does business in the state.
π Distributed denial of service (DDoS) attacks: A cheat sheet π
π Read
via "Security on TechRepublic".
This comprehensive guide covers different types of denial of service attacks, DDoS protection strategies, as well as why it matters for business.π Read
via "Security on TechRepublic".
TechRepublic
Distributed denial of service (DDoS) attacks: A cheat sheet
This comprehensive guide covers different types of denial of service attacks, DDoS protection strategies, as well as why it matters for business.
β Iranian APT33 Shakes Up Cyberespionage Tactics β
π Read
via "Threatpost".
After a March report exposed Iran-linked APT33's infrastructure and operations, the cyberespionage group has adopted new tactics and techniques.π Read
via "Threatpost".
Threat Post
Iran-linked APT33 Shakes Up Cyberespionage Tactics
After a March report exposed Iran-linked APT33's infrastructure and operations, the cyberespionage group has adopted new tactics and techniques.
β Cisco Warns of Critical Flaws in Data Center Network Manager β
π Read
via "Threatpost".
Cisco has patched two critical vulnerabilities in its Data Center Network Manager software, which could allow a remote attacker to take over affected devices.π Read
via "Threatpost".
Threat Post
Cisco Warns of Critical Flaws in Data Center Network Manager
Cisco has patched two critical vulnerabilities in its Data Center Network Manager software, which could allow a remote attacker to take over affected devices.
π΄ McAfee Sues 3 Former Staffers Now at Rival Tanium π΄
π Read
via "Dark Reading: ".
Lawsuit alleges sales representatives stole trade secrets from McAfee before joining Tanium.π Read
via "Dark Reading: ".
Dark Reading
McAfee Sues 3 Former Staffers Now at Rival Tanium
Lawsuit alleges sales representatives stole trade secrets from McAfee before joining Tanium.
π΄ Developers and Security Teams Under Pressure to Collaborate π΄
π Read
via "Dark Reading: ".
The challenges and benefits to getting two traditionally adversarial groups on the same page.π Read
via "Dark Reading: ".
Dark Reading
Developers and Security Teams Under Pressure to Collaborate
The challenges and benefits to getting two traditionally adversarial groups on the same page.
π΄ Breaking the Endless Cycle of "Perfect" Cybercrimes π΄
π Read
via "Dark Reading: ".
A two-step strategy for creating an attack environment that is more complex, less profitable, and more likely to expose the attacker.π Read
via "Dark Reading: ".
Dark Reading
Breaking the Endless Cycle of 'Perfect' Cybercrimes
A two-step strategy for creating an attack environment that is more complex, less profitable, and more likely to expose the attacker.
π΄ New Linux Worm Attacks IoT Devices π΄
π Read
via "Dark Reading: ".
Silex has 'bricked' more than 2,000 Linux-based IoT devices so far.π Read
via "Dark Reading: ".
Darkreading
New Linux Worm Attacks IoT Devices
Silex has 'bricked' more than 2,000 Linux-based IoT devices so far.
β Google Announces DNS over HTTPS βGeneral Availabilityβ β
π Read
via "Threatpost".
Google finalizes its DNS-over-HTTPS service inching toward a world where DNS request are sent via HTTPS and not UDP or TCP.π Read
via "Threatpost".
Threat Post
Google Announces DNS over HTTPS βGeneral Availabilityβ
Google finalizes its DNS-over-HTTPS service.
π΄ Malware Coming to a Mac Near You? Yes, Say Security Firms π΄
π Read
via "Dark Reading: ".
While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.π Read
via "Dark Reading: ".
Darkreading
Malware Coming to a Mac Near You? Yes, Say Security Firms
While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.
π TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download π
π Read
via "Security on TechRepublic".
TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.π Read
via "Security on TechRepublic".
TechRepublic
TechRepublic Premium Editorial Calendar: Policies, Hiring Kits, and Glossaries for Download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
π How organizations face risks by relying too much on cloud vendors for security π
π Read
via "Security on TechRepublic".
Many enterprises are too dependent on cloud vendors to secure their critical online data rather than adopting security as a shared responsibility, according to a survey from CyberArk.π Read
via "Security on TechRepublic".
TechRepublic
How organizations face risks by relying too much on cloud vendors for security
Many enterprises are too dependent on cloud vendors to secure their critical online data rather than adopting security as a shared responsibility, according to a survey from CyberArk.
π΄ Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA π΄
π Read
via "Dark Reading: ".
Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.π Read
via "Dark Reading: ".
Dark Reading
Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA
Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.
β Are heart electrocardiograms the next big thing in biometrics? β
π Read
via "Naked Security".
After fingers, the iris of the eye, ears and even lips, it was probably inevitable that someone would propose the human heart might be the next big thing in biometric security.π Read
via "Naked Security".
Naked Security
Are heart electrocardiograms the next big thing in biometrics?
After fingers, the iris of the eye, ears and even lips, it was probably inevitable that someone would propose the human heart might be the next big thing in biometric security.
β FTC crackdown targets operators behind 1 billion robocalls β
π Read
via "Naked Security".
It's a drop in the β4.7 billion robocalls placed per monthβ bucket, but hey, it's better than nothing!π Read
via "Naked Security".
Naked Security
FTC crackdown targets operators behind 1 billion robocalls
Itβs a drop in the β4.7 billion robocalls placed per monthβ bucket, but hey, itβs better than nothing!
β YouTubeβs antics with kidsβ data prompts call for FTC to force change β
π Read
via "Naked Security".
Sen. Markey and 2 consumer groups said the Google-owned service must comply with COPPA and should be held accountable for not doing so.π Read
via "Naked Security".
Naked Security
YouTubeβs antics with kidsβ data prompts call for FTC to force change
Sen. Markey and 2 consumer groups said the Google-owned service must comply with COPPA and should be held accountable for not doing so.