β FTC crackdown targets operators behind 1 billion robocalls β
π Read
via "Naked Security".
It's a drop in the β4.7 billion robocalls placed per monthβ bucket, but hey, it's better than nothing!π Read
via "Naked Security".
Naked Security
FTC crackdown targets operators behind 1 billion robocalls
Itβs a drop in the β4.7 billion robocalls placed per monthβ bucket, but hey, itβs better than nothing!
β YouTubeβs antics with kidsβ data prompts call for FTC to force change β
π Read
via "Naked Security".
Sen. Markey and 2 consumer groups said the Google-owned service must comply with COPPA and should be held accountable for not doing so.π Read
via "Naked Security".
Naked Security
YouTubeβs antics with kidsβ data prompts call for FTC to force change
Sen. Markey and 2 consumer groups said the Google-owned service must comply with COPPA and should be held accountable for not doing so.
π΄ Office 365 Multifactor Authentication Done Right π΄
π Read
via "Dark Reading: ".
Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.π Read
via "Dark Reading: ".
Darkreading
Office 365 Multifactor Authentication Done Right
Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.
π Will mobile devices replace passwords? π
π Read
via "Security on TechRepublic".
Mobile devices could provide a more secure, user-friendly mode of account authentication, according to an IDG and MobileIron report.π Read
via "Security on TechRepublic".
TechRepublic
Will mobile devices replace passwords?
Mobile devices could provide a more secure, user-friendly mode of account authentication, according to an IDG and MobileIron report.
β Tesla 3 navigation system fooled with GPS spoofing β
π Read
via "Naked Security".
Cybersecurity researchers have fooled the Tesla Model 3's automatic navigation system into rapidly braking and taking a wrong turn on the highway.π Read
via "Naked Security".
Naked Security
Tesla 3 navigation system fooled with GPS spoofing
Cybersecurity researchers have fooled the Tesla Model 3βs automatic navigation system into rapidly braking and taking a wrong turn on the highway.
β Thousands of IoT Devices Bricked By Silex Malware β
π Read
via "Threatpost".
A 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week. Threatpost talks to the researcher who discovered the malware.π Read
via "Threatpost".
Threat Post
Thousands of IoT Devices Bricked By Silex Malware
A 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week. Threatpost talks to the researcher who discovered the malware.
β New Microsoft Excel Attack Vector Surfaces β
π Read
via "Threatpost".
Researchers have identified security hole in Microsoft Officeβs Excel spreadsheet program that allows an attacker to trigger a malware attack on remote systems.π Read
via "Threatpost".
Threat Post
New Microsoft Excel Attack Vector Surfaces
Researchers have identified security hole in Microsoft Officeβs Excel spreadsheet program that allows an attacker to trigger a malware attack on remote systems.
ATENTIONβΌ New - CVE-2018-1893
π Read
via "National Vulnerability Database".
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152157.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-1892
π Read
via "National Vulnerability Database".
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152156.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-1828
π Read
via "National Vulnerability Database".
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150431.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-1827
π Read
via "National Vulnerability Database".
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150430.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-1826
π Read
via "National Vulnerability Database".
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150429.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-1760
π Read
via "National Vulnerability Database".
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148614.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-1758
π Read
via "National Vulnerability Database".
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148605.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-1734
π Read
via "National Vulnerability Database".
IBM Rational Collaborative Lifecycle Management 6.0 through 6.0.6.1 discloses sensitive information in error messages that may be used by a malicious user to orchestrate further attacks. IBM X-Force ID: 147838.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-15747 (glot-www)
π Read
via "National Vulnerability Database".
The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.π Read
via "National Vulnerability Database".
π How does the CVE scoring system work? π
π Read
via "Security on TechRepublic".
Have you ever wondered how vulnerabilities are scored? Here's a simplified explanation for an overly complex system.π Read
via "Security on TechRepublic".
TechRepublic
How does the CVE scoring system work?
Have you ever wondered how vulnerabilities are scored? Here's a simplified explanation for an overly complex system.
π΄ More Supply, More Demand: Cybersecurity Skills Gap Remains π΄
π Read
via "Dark Reading: ".
Although the number of programs for training workers in cybersecurity skills has increased, as well as the number of graduates, the gap in supply and demand for cybersecurity-skilled workers is essentially unchanged, leaving companies to struggle.π Read
via "Dark Reading: ".
Dark Reading
More Supply, More Demand: Cybersecurity Skills Gap Remains
Although the number of programs for training workers in cybersecurity skills has increased, as well as the number of graduates, the gap in supply and demand for cybersecurity-skilled workers is essentially unchanged, leaving companies to struggle.
π΄ Understanding & Defending Against Polymorphic Attacks π΄
π Read
via "Dark Reading: ".
Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here's why.π Read
via "Dark Reading: ".
Darkreading
Understanding & Defending Against Polymorphic Attacks
Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here's why.
ATENTIONβΌ New - CVE-2018-17478
π Read
via "National Vulnerability Database".
Incorrect array position calculations in V8 in Google Chrome prior to 70.0.3538.102 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-17460
π Read
via "National Vulnerability Database".
Insufficient data validation in filesystem URIs in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.π Read
via "National Vulnerability Database".