π΄ Black Hat USA Offers Inside Look at Boeing 787 Security Flaws π΄
π Read
via "Dark Reading: ".
The 787 Dreamliner, WhatsApp, and Windows 10 are all subjects of cutting-edge Reverse Engineering talks at this year's August event.π Read
via "Dark Reading: ".
Dark Reading
Black Hat USA Offers Inside Look at Boeing 787 Security Flaws
The 787 Dreamliner, WhatsApp, and Windows 10 are all subjects of cutting-edge Reverse Engineering talks at this year's August event.
π 83% have experienced a DDoS attack in the past two years, survey finds π
π Read
via "Security on TechRepublic".
The ease with which DDoS attacks can be waged makes them particularly prevalent, with over half surveyed experiencing multiple attacks waged against their organization.π Read
via "Security on TechRepublic".
β Protecting Against Ransomware Attacks: A Checklist β
π Read
via "Threatpost".
In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves.π Read
via "Threatpost".
Threat Post
Protecting Against Ransomware Attacks: A Checklist
In the second of a two part series discussing recent ransomware attacks against municipalities, Shawn Taylor with Forescout talks about how cities can protect themselves.
π΄ The Commoditization of Multistage Malware Attacks π΄
π Read
via "Dark Reading: ".
Malware that used to be advanced is now available to everyone. These three actions could help you stay safer.π Read
via "Dark Reading: ".
Darkreading
The Commoditization of Multistage Malware Attacks
Malware that used to be advanced is now available to everyone. These three actions could help you stay safer.
π΄ 7 Stats That Show What it Takes to Run a Modern SOC π΄
π Read
via "Dark Reading: ".
An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).π Read
via "Dark Reading: ".
Dark Reading
7 Stats That Show What it Takes to Run a Modern SOC
An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).
π How to prevent unsigned Docker images from being pulled π
π Read
via "Security on TechRepublic".
Make sure you're only pulling down signed Docker images with Content Trust enabled.π Read
via "Security on TechRepublic".
TechRepublic
How to prevent unsigned Docker images from being pulled
Make sure you're only pulling down signed Docker images with Content Trust enabled.
π How to prevent unsigned Docker images from being pulled π
π Read
via "Security on TechRepublic".
Make sure you're only pulling down signed Docker images with Content Trust enabled.π Read
via "Security on TechRepublic".
TechRepublic
How to prevent unsigned Docker images from being pulled
Make sure you're only pulling down signed Docker images with Content Trust enabled.
π Facebook data privacy scandal: A cheat sheet π
π Read
via "Security on TechRepublic".
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.π Read
via "Security on TechRepublic".
TechRepublic
Facebook data privacy scandal: A cheat sheet
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.
π΄ DEF CON Invites Kids to Crack Campaign Finance Portals π΄
π Read
via "Dark Reading: ".
DEF CON's Voting Village and AI Village team up with r00tz Asylum to let kids explore simulated campaign financial disclosure portals and disinformation campaigns.π Read
via "Dark Reading: ".
Darkreading
DEF CON Invites Kids to Crack Campaign Finance Portals
DEF CON's Voting Village and AI Village team up with r00tz Asylum to let kids explore simulated campaign financial disclosure portals and disinformation campaigns.
β Unique Monokle Android Spyware Self-Signs Certificates β
π Read
via "Threatpost".
Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election.π Read
via "Threatpost".
Threat Post
Unique Monokle Android Spyware Self-Signs Certificates
Researchers have linked the surveillance tool to a Russian tech firm that has been sanctioned for interfering with the 2016 U.S. presidential election.
π Highlighting Data Protection Best Practices for IIoT Systems π
π Read
via "Subscriber Blog RSS Feed ".
A new paper, released Monday, is designed to act as a best practices guide to IIoT (industrial IoT) systems that connect control systems with enterprise systems and business processes.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Highlighting Data Protection Best Practices for IIoT Systems
As IIoT (Industrial IoT) systems continue to interact with enterprise systems and business processes, a new guide offers a set of best practices to securing them.
π΄ Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack π΄
π Read
via "Dark Reading: ".
IoT botnet-made up mainly of routers-hit a service provider with nearly 300,000 requests-per-second in a 13-day deluge of data.π Read
via "Dark Reading: ".
Darkreading
Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack
IoT botnetβmade up mainly of routersβhit a service provider with nearly 300,000 requests-per-second in a 13-day deluge of data.
π Tech news roundup: Managing IoT, new iPhones, and phishing concerns π
π Read
via "Security on TechRepublic".
This week's stories from TechRepublic and ZDNet include AI's influence on retail, the onslaught of malicious emails, and a look at why 50% of employees aren't satisfied.π Read
via "Security on TechRepublic".
TechRepublic
Tech news roundup: Managing IoT, new iPhones, and phishing concerns
This week's stories from TechRepublic and ZDNet include AI's influence on retail, the onslaught of malicious emails, and a look at why 50% of employees aren't satisfied.
π Tech news roundup: Managing IoT, new iPhones, and phishing concerns π
π Read
via "Security on TechRepublic".
This week's stories from TechRepublic and ZDNet include AI's influence on retail, the onslaught of malicious emails, and a look at why 50% of employees aren't satisfied.π Read
via "Security on TechRepublic".
TechRepublic
Tech news roundup: Managing IoT, new iPhones, and phishing concerns
This week's stories from TechRepublic and ZDNet include AI's influence on retail, the onslaught of malicious emails, and a look at why 50% of employees aren't satisfied.
π΄ NSA to Form New Cybersecurity Directorate π΄
π Read
via "Dark Reading: ".
Anne Neuberger will lead the directorate, which aims to bring together the NSA's offensive and defensive operations.π Read
via "Dark Reading: ".
Darkreading
NSA to Form New Cybersecurity Directorate
Anne Neuberger will lead the directorate, which aims to bring together the NSA's offensive and defensive operations.
β ThreatList: Human Error is Behind One Quarter of Data Breaches β
π Read
via "Threatpost".
Meanwhile, remediation times are ballooning to a year or more in the case of malicious attacks, according to Ponemon Institute.π Read
via "Threatpost".
Threat Post
ThreatList: Human Error is Behind One Quarter of Data Breaches
Meanwhile, remediation times are ballooning to a year or more in the case of malicious attacks, according to Ponemon Institute.
π΄ With Data Breach Costs, Time is Money π΄
π Read
via "Dark Reading: ".
The sooner a company can detect and respond to an incident, the less likely they are to pay for it, a new IBM-Ponemon study finds.π Read
via "Dark Reading: ".
Darkreading
With Data Breach Costs, Time is Money
The sooner a company can detect and respond to an incident, the less likely they are to pay for it, a new IBM-Ponemon study finds.
β Popular File-Sharing Service WeTransfer Used in Malicious Spam Campaigns β
π Read
via "Threatpost".
WeTransfer is being used by hackers to circumvent email gateways looking to zap malicious links.π Read
via "Threatpost".
Threat Post
Popular File-Sharing Service WeTransfer Used in Malicious Spam Campaigns
WeTransfer is being used by hackers to circumvent email gateways looking to zap malicious links.
π΄ How to Create Smarter Risk Assessments π΄
π Read
via "Dark Reading: ".
Executives and directors need quantitative measurements - such as likelihood of loss and hard-dollar financial impact - to make more informed decisions about security risks.π Read
via "Dark Reading: ".
Dark Reading
How to Create Smarter Risk Assessments
Executives and directors need quantitative measurements - such as likelihood of loss and hard-dollar financial impact - to make more informed decisions about security risks.
β You can probably be identified from your anonymized data β
π Read
via "Naked Security".
The idea of de-identifying data has been around for a while. However, a study published this week asserts that itβs even easier to re-identify information than we first thought.π Read
via "Naked Security".
Naked Security
You can probably be identified from your anonymized data
The idea of de-identifying data has been around for a while. However, a study published this week asserts that itβs even easier to re-identify information than we first thought.
π΄ Android Malware 'Triada' Most Active on Telco Networks π΄
π Read
via "Dark Reading: ".
Google in May disclosed that several Android devices had been shipped pre-installed with the RAT.π Read
via "Dark Reading: ".
Dark Reading
Android Malware 'Triada' Most Active on Telco Networks
Google in May disclosed that several Android devices had been shipped pre-installed with the RAT.