β Bluetooth Flaws Could Allow Global Tracking of Apple, Windows 10 Devices β
π Read
via "Threatpost".
Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices -- opening an attack vector.π Read
via "Threatpost".
Threat Post
Bluetooth Flaws Could Allow Global Tracking of Apple, Windows 10 Devices
Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices β opening an attack vector.
β Firmware Bugs Plague Server Supply Chain, 7 Vendors Impacted β
π Read
via "Threatpost".
Lenovo, Acer and five additional server manufacturers are hit with supply-chain bugs buried in motherboard firmware.π Read
via "Threatpost".
Threat Post
Firmware Bugs Plague Server Supply Chain, 7 Vendors Impacted
Lenovo, Acer and five additional server manufacturers are hit with supply-chain bugs buried in motherboard firmware.
π Seven CCPA Amendments Advance π
π Read
via "Subscriber Blog RSS Feed ".
As the California Consumer Privacy Act (CCPA) continues to take shape, the state's Senate Committee on the Judiciary voted to advance seven amendments to the law last week but not after making some changes.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Seven CCPA Amendments Advance
As the California Consumer Privacy Act (CCPA) continues to take shape, the state's Senate Committee on the Judiciary voted to advance seven amendments to the law last week but not after making some changes.
π΄ A Password Management Report Card π΄
π Read
via "Dark Reading: ".
New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings.π Read
via "Dark Reading: ".
Darkreading
A Password Management Report Card
New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings.
π΄ 800K Systems Still Vulnerable to BlueKeep π΄
π Read
via "Dark Reading: ".
Organizations with systems exploitable via the RDP flaw pose an increasing risk to themselves and other organizations, BitSight says.π Read
via "Dark Reading: ".
Dark Reading
800K Systems Still Vulnerable to BlueKeep
Organizations with systems exploitable via the RDP flaw pose an increasing risk to themselves and other organizations, BitSight says.
π΄ Sprint Reveals Account Breach via Samsung Website π΄
π Read
via "Dark Reading: ".
The last-June breach exposed data includes names, phone numbers, and account numbers.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ Bluetooth Bug Enables Tracking on Windows 10, iOS & macOS Devices π΄
π Read
via "Dark Reading: ".
Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access.π Read
via "Dark Reading: ".
Darkreading
Bluetooth Bug Enables Tracking on Windows 10, iOS & macOS Devices
Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access.
β Wormable BlueKeep Bug Still Threatens Legions of Windows Systems β
π Read
via "Threatpost".
Two months after the alarm sounded warning of a WannaCry-level event, progress in patching exposed Windows systems varies by country and industry.π Read
via "Threatpost".
Threat Post
Wormable BlueKeep Bug Still Threatens Legions of Windows Systems
Two months after the alarm sounded warning of a WannaCry-level event, progress in patching exposed Windows systems varies by country and industry.
π΄ MITRE ATT&CK Framework Not Just for the Big Guys π΄
π Read
via "Dark Reading: ".
At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language.π Read
via "Dark Reading: ".
Darkreading
MITRE ATT&CK Framework Not Just for the Big Guys
At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language.
β Still not using HTTPS? Firefox is about to shame you β
π Read
via "Naked Security".
Two years after promising to report all HTTP-based web pages as insecure, Mozilla is about to deliver.π Read
via "Naked Security".
Naked Security
Still not using HTTPS? Firefox is about to shame you
Two years after promising to report all HTTP-based web pages as insecure, Mozilla is about to deliver.
β Google Chrome is ditching its XSS detection tool β
π Read
via "Naked Security".
Google's throwing in the towel on XSS Auditor and putting its trust in Trusted Types instead.π Read
via "Naked Security".
Naked Security
Google Chrome is ditching its XSS detection tool
Googleβs throwing in the towel on XSS Auditor and putting its trust in Trusted Types instead.
β Hacked Bluetooth hair straighteners are too hot to handle β
π Read
via "Naked Security".
The Glamoriser Smart Bluetooth straightener offers up yet another example of how not to add a risky product to the Internet of Things (IoT).π Read
via "Naked Security".
Naked Security
Hacked Bluetooth hair straighteners are too hot to handle
The Glamoriser Smart Bluetooth straightener offers up yet another example of how not to add a risky product to the Internet of Things (IoT).
π Why 70% of healthcare orgs have suffered data breaches π
π Read
via "Security on TechRepublic".
Digital transformation initiatives bring a slew of data privacy concerns to US health organizations, according to a Thales report.π Read
via "Security on TechRepublic".
TechRepublic
Why 70% of healthcare orgs have suffered data breaches
Digital transformation initiatives bring a slew of data privacy concerns to US health organizations, according to a Thales report.
β Series 2 launch episode β RDP exposed [PODCAST] β
π Read
via "Naked Security".
The Naked Security Podcast is back. Listen now, and let us know what you think!π Read
via "Naked Security".
Naked Security
Series 2 launch episode β RDP exposed [PODCAST]
The Naked Security Podcast is back. Listen now, and let us know what you think!
π Lateral phishing: Hackers are taking over business accounts to send malicious emails π
π Read
via "Security on TechRepublic".
The use of compromised accounts to send phishing emails to contacts inside and outside an organization is an increasing security threat.π Read
via "Security on TechRepublic".
TechRepublic
Lateral phishing: Hackers are taking over business accounts to send malicious emails
The use of compromised accounts to send phishing emails to contacts inside and outside an organization is an increasing security threat.
π Why 72% of people still recycle passwords π
π Read
via "Security on TechRepublic".
Users recycle the same password an average of four times, according to a Security.org report.π Read
via "Security on TechRepublic".
π΄ Calculating the Value of Security π΄
π Read
via "Dark Reading: ".
What will it take to align staff and budget to protect the organization?π Read
via "Dark Reading: ".
Darkreading
Calculating the Value of Security
What will it take to align staff and budget to protect the organization?
ATENTIONβΌ New - CVE-2016-10763
π Read
via "National Vulnerability Database".
The CampTix Event Ticketing plugin before 1.5 for WordPress allows XSS in the admin section via a ticket title or body.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10762
π Read
via "National Vulnerability Database".
The CampTix Event Ticketing plugin before 1.5 for WordPress allows CSV injection when the export tool is used.π Read
via "National Vulnerability Database".
π΄ 79% of US Consumers Fear Webcams Are Watching π΄
π Read
via "Dark Reading: ".
Widespread privacy concerns have caused 60% of people to cover their laptop webcams - some in creative ways - survey data shows.π Read
via "Dark Reading: ".
Dark Reading
79% of US Consumers Fear Webcams Are Watching
Widespread privacy concerns have caused 60% of people to cover their laptop webcams - some in creative ways - survey data shows.