β Scammers Prey on Instagram Vanity and βVerified Accountβ Status β
π Read
via "Threatpost".
Hackers are stealing Instagram credentials through a tricky phishing scam that asks victims to apply for exclusive verified account status.π Read
via "Threatpost".
Threat Post
Scammers Prey on Instagram Vanity and βVerified Accountβ Status
Hackers are stealing Instagram credentials through a tricky phishing scam that asks victims to apply for exclusive verified account status.
π΄ 7 Ways to Mitigate Supply Chain Attacks π΄
π Read
via "Dark Reading: ".
Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.π Read
via "Dark Reading: ".
Dark Reading
7 Ways to Mitigate Supply Chain Attacks
Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.
π΄ Inside MLS, the New Protocol for Secure Enterprise Messaging π΄
π Read
via "Dark Reading: ".
As personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security.π Read
via "Dark Reading: ".
Dark Reading
Inside MLS, the New Protocol for Secure Enterprise Messaging
As personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security.
β Leaky Amazon S3 Buckets Expose Data of Netflix, TD Bank β
π Read
via "Threatpost".
Netflix, TD Bank, and Ford were only a few of the companies whose data was exposed by three leaky Amazon S3 buckets owned by Attunity.π Read
via "Threatpost".
Threat Post
Leaky Amazon S3 Buckets Expose Data of Netflix, TD Bank
Netflix, TD Bank, and Ford were only a few of the companies whose data was exposed by three leaky Amazon S3 buckets owned by Attunity.
π΄ Former Equifax CIO Sentenced to Prison for Insider Trading π΄
π Read
via "Dark Reading: ".
Jun Ying is the second Equifax employee found guilty of insider trading related to the massive 2017 data breach.π Read
via "Dark Reading: ".
Darkreading
Former Equifax CIO Sentenced to Prison for Insider Trading
Jun Ying is the second Equifax employee found guilty of insider trading related to the massive 2017 data breach.
π΄ NIST Issues IoT Risk Guidelines π΄
π Read
via "Dark Reading: ".
A new report offers the first step toward understanding and managing IoT cybersecurity risks.π Read
via "Dark Reading: ".
Dark Reading
NIST Issues IoT Risk Guidelines
A new report offers the first step toward understanding and managing IoT cybersecurity risks.
β Smart Lock Turns Out to be Not So Smart, or Secure β
π Read
via "Threatpost".
Pentesters say a keyless smart lock made by U-tec, called Ultraloq, is neither ultra or secure.π Read
via "Threatpost".
Threat Post
Smart Lock Turns Out to be Not So Smart, or Secure
Pentesters say a keyless smart lock made by U-tec, called Ultraloq, is neither ultra or secure.
π΄ Chronicle Folds into Google π΄
π Read
via "Dark Reading: ".
Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.π Read
via "Dark Reading: ".
Dark Reading
Chronicle Folds into Google
Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.
π΄ New Exploit for Microsoft Excel Power Query π΄
π Read
via "Dark Reading: ".
Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.π Read
via "Dark Reading: ".
Darkreading
New Exploit for Microsoft Excel Power Query
Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.
β Cryptocurrency phish dials back the fear, cranks up the politeness β
π Read
via "Naked Security".
Spammers and scammers are getting better at spelling and grammar - so make sure you aren't relying on language alone to spot phishes...π Read
via "Naked Security".
Naked Security
Cryptocurrency phish dials back the fear, cranks up the politeness
Spammers and scammers are getting better at spelling and grammar β so make sure you arenβt relying on language alone to spot phishesβ¦
β Google Maps shortcut turns into 100-car mud pie in farmerβs field β
π Read
via "Naked Security".
Trying to save 20 minutes, 100 drivers took a Google Maps shortcut... into a field, where the mud-stuck cars then caused a 2-hour delay.π Read
via "Naked Security".
Naked Security
Google Maps shortcut turns into 100-car mud pie in farmerβs field
Trying to save 20 minutes, 100 drivers took a Google Maps shortcut⦠into a field, where the mud-stuck cars then caused a 2-hour delay.
β Mozillaβs bizarre robo-surfer project demonstrates ad snooping β
π Read
via "Naked Security".
In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that you're someone else.π Read
via "Naked Security".
Naked Security
Mozillaβs bizarre robo-surfer project demonstrates ad snooping
In an effort to show you how advertisers snoop on your surfing activity, Mozilla is offering you the chance to pretend that youβre someone else.
β $50 DeepNude app undresses women with a single click β
π Read
via "Naked Security".
"I'm not a voyeur, I'm a technology enthusiast,β says the creator, who combined deepfake AI with a need for cash to get ka-CHING!π Read
via "Naked Security".
Naked Security
$50 DeepNude app undresses women with a single click
βIβm not a voyeur, Iβm a technology enthusiast,β says the creator, who combined deepfake AI with a need for cash to get ka-CHING!
β Death of the VPN: Enterprise Security Needs New Foundations β
π Read
via "Threatpost".
Twenty years in, enterprise VPNs occupy a uniquely solid position in a changing landscape.π Read
via "Threatpost".
Threat Post
Death of the VPN: Enterprise Security Needs New Foundations
Twenty years in, enterprise VPNs occupy a uniquely solid position in a changing landscape.
π΄ Black Hat USA's New Micro Summits Deliver Focused, Practical Security Insights π΄
π Read
via "Dark Reading: ".
This year Black Hat USA is introducing special half-day programs focused on important topics that combine subject matter expertise with networking opportunities.π Read
via "Dark Reading: ".
Dark Reading
Black Hat USA's New Micro Summits Deliver Focused, Practical Security Insights
This year Black Hat USA is introducing special half-day programs focused on important topics that combine subject matter expertise with networking opportunities.
π How SMBs can better protect sensitive data against cyberattacks π
π Read
via "Security on TechRepublic".
Know your enemy and know your risk are two pieces of advice offered in a new report from security company eSentire.π Read
via "Security on TechRepublic".
TechRepublic
How SMBs can better protect sensitive data against cyberattacks
Know your enemy and know your risk are two pieces of advice offered in a new report from security company eSentire.
π΄ How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy π΄
π Read
via "Dark Reading: ".
Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.π Read
via "Dark Reading: ".
Darkreading
How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy
Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.
β FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps β
π Read
via "Threatpost".
The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S.π Read
via "Threatpost".
Threat Post
FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps
The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S.
π Friday Five: 6/28 Edition π
π Read
via "Subscriber Blog RSS Feed ".
A $600,000 ransomware payment, statistics on the cybersecurity talent shortage, and more - catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 6/28 Edition
A $600,000 ransomware payment, statistics on the cybersecurity talent shortage, and more - catch up on the week's news with this roundup!
π΄ Cloud Provider PCM Suffers Data Breach π΄
π Read
via "Dark Reading: ".
Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.π Read
via "Dark Reading: ".
Darkreading
Cloud Provider PCM Suffers Data Breach
Attackers were reportedly able to compromise email and file-sharing systems for some of PCM's customers.
ATENTIONβΌ New - CVE-2018-15555
π Read
via "National Vulnerability Database".
On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.π Read
via "National Vulnerability Database".