β Why are they βsmartβ locks if more money buys you less security? β
π Read
via "Naked Security".
Smart locks are cool and useful - but they are also a great reminder that cybersecurity is all about value, not cost.π Read
via "Naked Security".
Naked Security
Why are they βsmartβ locks if more money buys you less security?
Smart locks are cool and useful β but they are also a great reminder that cybersecurity is all about value, not cost.
β Deepfake revenge porn now a crime in Virginia β
π Read
via "Naked Security".
It's the first state to enact a deepfakes ban, but it's not going to be the last: laws are being considered in many other states.π Read
via "Naked Security".
Naked Security
Deepfake revenge porn now a crime in Virginia
Itβs the first state to enact a deepfakes ban, but itβs not going to be the last: laws are being considered in many other states.
β Mannequin Challenge videos teach computers to see β
π Read
via "Naked Security".
An internet craze could change the way computers see, thanks to research published by Google.π Read
via "Naked Security".
Naked Security
Mannequin Challenge videos teach computers to see
An internet craze could change the way computers see, thanks to research published by Google.
β Bitcoin eats as much energy as Switzerland β
π Read
via "Naked Security".
That's around seven gigawatts, equal to 0.21% of the world's supply: as much power as generated by seven Dungeness nuclear power plants.π Read
via "Naked Security".
Naked Security
Bitcoin eats as much energy as Switzerland
Thatβs around seven gigawatts, equal to 0.21% of the worldβs supply: as much power as generated by seven Dungeness nuclear power plants.
β OpenPGP experts targeted by long-feared βpoisoningβ attack β
π Read
via "Naked Security".
Somebody out there has taken a big dislike to Robert J. Hansen (βrjhβ) and Daniel Kahn Gillmor (βdkgβ), two well-regarded experts in the specialised world of OpenPGP email encryption.π Read
via "Naked Security".
Naked Security
OpenPGP experts targeted by long-feared βpoisoningβ attack
Somebody out there has taken a big dislike to Robert J. Hansen (βrjhβ) and Daniel Kahn Gillmor (βdkgβ), two well-regarded experts in the specialised world of OpenPGP email encryption.
π Friday Five: 7/5 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Cracking a five year Facebook malware campaign, this week's CDN outage, and an app fined for leaking users' photos - catch up on the week's news with this recap!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 7/5 Edition
Cracking a five year Facebook malware campaign, this week's CDN outage, and an app fined for leaking users' photos - catch up on the week's news with this recap!
π΄ Why Your GDPR Implementation Plan Needs CISOs & 'Legal Engineers' to Work Together π΄
π Read
via "Dark Reading: ".
Lawyers must step into the shoes of technical roles and craft legal guidance that can be easily put into use.π Read
via "Dark Reading: ".
Dark Reading
Dark Reading | Security | Protect The Business - Enable Access
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
β 5 tips to stay secure on social media β
π Read
via "Naked Security".
Social media isn't for everyone, but lots of us love it - so here's how to be in it and win it.π Read
via "Naked Security".
Naked Security
5 tips to stay secure on social media
Social media isnβt for everyone, but lots of us love it β so hereβs how to be in it and win it.
β PGP Ecosystem Targeted in βPoisoningβ Attacks β
π Read
via "Threatpost".
Two researchers are being singled out in what are called PGP poisoning or flood attacks that render the authentication tool unusable for victims.π Read
via "Threatpost".
Threat Post
PGP Ecosystem Targeted in βPoisoningβ Attacks
Two researchers are being singled out in what are called PGP poising or flood attacks that render the authentication tool unusable for victims.
π΄ Intelligent Authentication Market Grows to Meet Demand π΄
π Read
via "Dark Reading: ".
Confidence in user identity is critical to prevent fraud and theft, and companies are looking for new ways to get the necessary assurance.π Read
via "Dark Reading: ".
Darkreading
Intelligent Authentication Market Grows to Meet Demand
Confidence in user identity is critical to prevent fraud and theft, and companies are looking for new ways to get the necessary assurance.
β WordPress Plugin WP Statistics Patches XSS Flaw β
π Read
via "Threatpost".
A cross-site scripting vulnerability in WordPress plugin WP Statistics could have enabled full website takeover.π Read
via "Threatpost".
Threat Post
WordPress Plugin WP Statistics Patches XSS Flaw
A cross-site scripting vulnerability in WordPress plugin WP Statistics could have enabled full website takeover.
π΄ UK Forensics Firm Paid Ransom in Cyberattack π΄
π Read
via "Dark Reading: ".
Victim firm Eurofins Scientific handles more than 70,000 criminal cases per year in the UK.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
β Data Breach Lessons from the Trenches β
π Read
via "Threatpost".
How companies can identify their own insecure data, remediate data breaches and proactively secure data against future attacks.π Read
via "Threatpost".
Threat Post
Data Breach Lessons from the Trenches
How companies can identify their own insecure data, remediate data breaches and proactively secure data against future attacks.
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From RDP BlueKeep's message for admins to Medtronic's recall of hackable insulin pumps - and everything in between.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From RDP BlueKeepβs message for admins to Medtronicβs recall of hackable insulin pumps β and everything in between.
β New Yearβs eve gaming DDoSer lulz himself into a 27-month sentence β
π Read
via "Naked Security".
Back in 2014, @DerpTrolling said he attacked sites simply based on requests from people who tweeted suggested targets.π Read
via "Naked Security".
Naked Security
New Yearβs eve gaming DDoSer lulz himself into a 27-month sentence
Back in 2014, @DerpTrolling said he attacked sites simply based on requests from people who tweeted suggested targets.
β ISPs call Mozilla βInternet Villainβ for promoting DNS privacy β
π Read
via "Naked Security".
ISPA has shortlisted Mozilla for the sort of award that, on the face of it, no tech company should be keen to win - 2019βs Internet Villain.π Read
via "Naked Security".
Naked Security
ISPs call Mozilla βInternet Villainβ for promoting DNS privacy
ISPA has shortlisted Mozilla for the sort of award that, on the face of it, no tech company should be keen to win β 2019βs Internet Villain.
π΄ 7 Hot Cybersecurity Trends to Be Highlighted at Black Hat π΄
π Read
via "Dark Reading: ".
Just some of the research and ideas worth checking out at this year's 'security summer camp.'π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
β Privacy and security risks as Sign In with Apple tweaks Open ID protocol β
π Read
via "Naked Security".
An open letter from the OpenID Foundation says that Apple introduced potential risks when it diverged from the OpenID Connect protocol.π Read
via "Naked Security".
Naked Security
Privacy and security risks as Sign In with Apple tweaks Open ID protocol
An open letter from the OpenID Foundation says that Apple introduced potential risks when it diverged from the OpenID Connect protocol.
π How to use multiplexing to speed up the SSH π
π Read
via "Security on TechRepublic".
Improve the speed SSH can run commands on remote servers with the help of multiplexing.π Read
via "Security on TechRepublic".
TechRepublic
How to use multiplexing to speed up the SSH login process
Improve the speed SSH can run commands on remote servers with the help of multiplexing.
β Researchers hack VR worlds β
π Read
via "Naked Security".
Hackers just infiltrated virtual reality, enabling them to manipulate users' immersive 3D worlds.π Read
via "Naked Security".
Naked Security
Researchers hack VR worlds
Hackers just infiltrated virtual reality, enabling them to manipulate usersβ immersive 3D worlds.
π British Airways hit with Β£183M GDPR fineβcould your business be next? π
π Read
via "Security on TechRepublic".
GDPR fines are finally coming down, and companies must be prepared to comply with the regulations or pay up.π Read
via "Security on TechRepublic".
TechRepublic
British Airways hit with Β£183M GDPR fineβcould your business be next?
GDPR fines are finally coming down, and companies must be prepared to comply with the regulations or pay up.