π΄ GDPR Report Card: Some Early Gains but More Work Ahead π΄
π Read
via "Dark Reading: ".
US companies paid the most, to date, to meet the EU's General Data Protection Regulation, according to a recent study, but UK companies made greater progress in achieving compliance goals.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
π Windows 10 October update problems: Wiped docs, plus Intel driver warning π
π Read
via "Security on TechRepublic".
Back up files before upgrading to Windows 10 1809, and if you get a warning about Intel drivers, do not proceed.π Read
via "Security on TechRepublic".
π΄ For $14.71, You Can Buy A Passport Scan on the Dark Web π΄
π Read
via "Dark Reading: ".
That's the average price of a digital passport scan, and it goes up with proof of identification, a new study finds.π Read
via "Dark Reading: ".
Dark Reading
For $14.71, You Can Buy A Passport Scan on the Dark Web
That's the average price of a digital passport scan, and it goes up with proof of identification, a new study finds.
β Apple, Amazon Strongly Refute Server Infiltration Report β
π Read
via "The first stop for security news | Threatpost ".
An explosive Bloomberg report, if true, would highlight the largest supply chain attack to have been launched against American corporations.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Apple, Amazon Strongly Refute Server Infiltration Report
An explosive Bloomberg report, if true, would highlight the largest supply chain attack to have been launched against American corporations.
π The top 10 cyberthreats IT security teams are facing right now π
π Read
via "Security on TechRepublic".
Some 70% of organizations experienced a security breach in the past year, according to a report from Cyren and Osterman Research.π Read
via "Security on TechRepublic".
TechRepublic
The top 10 cyberthreats IT security teams are facing right now
Some 70% of organizations experienced a security breach in the past year, according to a report from Cyren and Osterman Research.
π BlackBerry's new blockchain tools could boost security for medical IoT π
π Read
via "Security on TechRepublic".
Fresh off the announcement of its Spark platform, BlackBerry unveiled a host of tools aimed at improving data privacy in healthcare.π Read
via "Security on TechRepublic".
TechRepublic
BlackBerry's new blockchain tools could boost security for medical IoT
Fresh off the announcement of its Spark platform, BlackBerry unveiled a host of tools aimed at improving data privacy in healthcare.
β Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets β
π Read
via "The first stop for security news | Threatpost ".
Russian-speaking Turla has also racked up more victims in its latest APT campaign.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
Russian-speaking Turla has also racked up more victims in its latest APT campaign.
β ThreatList: 83% of Routers Contain Vulnerable Code β
π Read
via "The first stop for security news | Threatpost ".
Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: 83% of Routers Contain Vulnerable Code
Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.
π΄ Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards π΄
π Read
via "Dark Reading: ".
If true, the attack using Supermicro motherboards could be the most comprehensive cyber breach in history.π Read
via "Dark Reading: ".
Darkreading
Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
If true, the attack using Supermicro motherboards could be the most comprehensive cyber breach in history.
π΄ 7 Steps to Start Your Risk Assessment π΄
π Read
via "Dark Reading: ".
Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.π Read
via "Dark Reading: ".
Dark Reading
7 Steps to Start Your Risk Assessment
Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.
π΄ US Indicts 7 Russian Intel Officers for Hacking Anti-Doping Organizations π΄
π Read
via "Dark Reading: ".
Netherlands expels four of the suspects trying to break into an organization investigating a chemical used in the recent attack on a former Russian spy in Britain.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2015-9271
π Read
via "National Vulnerability Database".
The VideoWhisper videowhisper-video-conference-integration plugin 4.91.8 for WordPress allows remote attackers to execute arbitrary code because vc/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code, a different vulnerability than CVE-2014-1905.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9272
π Read
via "National Vulnerability Database".
The videowhisper-video-presentation plugin 3.31.17 for WordPress allows remote attackers to execute arbitrary code because vp/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2014-10076
π Read
via "National Vulnerability Database".
The wp-db-backup plugin 2.2.4 for WordPress relies on a five-character string for access control, which makes it easier for remote attackers to read backup archives via a brute-force attack.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2014-10075
π Read
via "National Vulnerability Database".
The karo gem 2.3.8 for Ruby allows Remote command injection via the host field.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-7465
π Read
via "National Vulnerability Database".
Ice Cold Apps Servers Ultimate 6.0.2(12) does not require authentication for TELNET, SSH, or FTP, which allows remote attackers to execute arbitrary code by uploading PHP scripts.π Read
via "National Vulnerability Database".
β Googleβs Intra app secures older Androids with encrypted DNS β
π Read
via "Naked Security".
DNS encryption is the Next Big Thing in web encryption and Google doesn't want Android users to miss out.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Facebook doubles cooling off period to cash in on your FOMO β
π Read
via "Naked Security".
Facebook has doubled its grace period because so many leavers are getting cold feet.π Read
via "Naked Security".
Naked Security
Facebook doubles cooling off period to cash in on your FOMO
Facebook has doubled its grace period because so many leavers are getting cold feet.
β Wi-Fi versions to get names people can actually understand β
π Read
via "Naked Security".
The high priests of Wi-Fi just made your life - and the lives of wireless network equipment vendors everywhere - a little easier.π Read
via "Naked Security".
Naked Security
Wi-Fi versions to get names people can actually understand
The high priests of Wi-Fi just made your life β and the lives of wireless network equipment vendors everywhere β a little easier.
β Prison smuggler busted by his own drone camera β
π Read
via "Naked Security".
It turns out that drones advertised off the back of beautiful aerial shots also take great videos of murky drug dens.π Read
via "Naked Security".
Naked Security
Prison smuggler busted by his own drone camera
It turns out that drones advertised off the back of beautiful aerial shots also take great videos of murky drug dens.
π΄ Who Do You Trust? Parsing the Issues of Privacy, Transparency & Control π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
Who Do You Trust? Parsing the Issues of Privacy, Transparency & Control
Technology such as Apple's device trust score that decides you is not you is a good thing. But only if it works well.