ATENTIONβΌ New - CVE-2007-6762
π Read
via "National Vulnerability Database".
In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array.π Read
via "National Vulnerability Database".
β Ransomware hits Louisiana schools; state of emergency declared β
π Read
via "Naked Security".
The Louisiana Governor declared a state of emergency after three public school districts were seized by ransomware.π Read
via "Naked Security".
Naked Security
Ransomware hits Louisiana schools; state of emergency declared
The Louisiana Governor declared a state of emergency after three public school districts were seized by ransomware.
β Monday review β the hot 21 stories of the week β
π Read
via "Naked Security".
From iOS 13's password hole to logic bombs courtesy of the programmer from hell - and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 21 stories of the week
From iOS 13βs password hole to logic bombs courtesy of the programmer from hell β and everything in between. Itβs weekly roundup time.
π΄ A Security-First Approach to DevOps π΄
π Read
via "Dark Reading: ".
Aware of the risks inherent in software, businesses are recognizing the need for application security.π Read
via "Dark Reading: ".
Dark Reading
A Security-First Approach to DevOps
Aware of the risks inherent in software, businesses are recognizing the need for application security.
π Is homomorphic encryption ready to deliver confidential cloud computing to enterprises? π
π Read
via "Security on TechRepublic".
The ability to keep data encrypted while you use it for computations in the cloud could protect data from attackers and malicious insiders alike. There is still a performance hit, but you can start using open-source libraries to take advantage of that.π Read
via "Security on TechRepublic".
TechRepublic
Is homomorphic encryption ready to deliver confidential cloud computing to enterprises?
The ability to keep data encrypted while you use it for computations in the cloud could protect data from attackers and malicious insiders alike. There is still a performance hit, but you can start using open-source libraries to take advantage of that.
β Three quarters of gamers suffer hate and harassment online β
π Read
via "Naked Security".
Trolling, stalking, sexual harassment, and humiliation have become so bad that one in ten respondents had depressive or suicidal thoughts.π Read
via "Naked Security".
Naked Security
Three quarters of gamers suffer hate and harassment online
Trolling, stalking, sexual harassment, and humiliation have become so bad that one in ten respondents had depressive or suicidal thoughts.
π΄ 9 Things That Don't Worry You Today (But Should) π΄
π Read
via "Dark Reading: ".
There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.π Read
via "Dark Reading: ".
Darkreading
9 Things That Don't Worry You Today (But Should)
There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.
β NAS vendors hit by brute force ransomware attacks β
π Read
via "Naked Security".
Cybercriminals are targeting numerous Network Attached Storage vendors with a new wave of ransomware.π Read
via "Naked Security".
Naked Security
NAS targeted by brute force ransomware attacks
Cybercriminals are targeting numerous Network Attached Storage vendors with a new wave of ransomware.
β Russia targeted all 50 states in 2016 election, Senate report says β
π Read
via "Naked Security".
The Senate Intelligence Committee doesn't know what Moscow's intentions are, but Robert Mueller says they're still at it.π Read
via "Naked Security".
Naked Security
Russia targeted all 50 states in 2016 election, Senate report says
The Senate Intelligence Committee doesnβt know what Moscowβs intentions are, but Robert Mueller says theyβre still at it.
β βWannaCry Heroβ Avoids Jail Time in Kronos Malware Charges β
π Read
via "Threatpost".
Marcus Hutchins, also known by his online alias MalwareTech, has been spared jail time in his sentencing for the creation of the Kronos malware.π Read
via "Threatpost".
Threat Post
βWannaCry Heroβ Avoids Jail Time in Kronos Malware Charges
Marcus Hutchins, also known by his online alias MalwareTech, has been spared jail time in his sentencing for the creation of the Kronos malware.
π 100+ IT policies at your fingertips, ready for download π
π Read
via "Security on TechRepublic".
From BYOD and social media to ergonomics and encryption, TechRepublic has dozens of ready-made, downloadable IT policy templates.π Read
via "Security on TechRepublic".
TechRepublic
100+ IT Policies at Your Fingertips and Ready for Download | TechRepublic
From BYOD and social media to ergonomics and encryption, TechRepublic Premium has dozens of ready-made, downloadable IT policy templates.
π΄ 4 Network Security Mistakes Bound to Bite You π΄
π Read
via "Dark Reading: ".
It's Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help.π Read
via "Dark Reading: ".
Darkreading
4 Network Security Mistakes Bound to Bite You
It's Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help.
β Fearing WannaCry-Level Danger, Enterprises Wrestle with BlueKeep β
π Read
via "Threatpost".
Fears of a WannaCry-level global attack grow as working exploit info starts to go public.π Read
via "Threatpost".
Threat Post
Fearing WannaCry-Level Danger, Enterprises Wrestle with BlueKeep
Fears of a WannaCry-level global attack grow as working exploit info starts to go public.
β βURGENT/11β Critical Infrastructure Bugs Threaten EternalBlue-Style Attacks β
π Read
via "Threatpost".
Researchers have uncovered easy-to-exploit bugs that can impact physical safety, utilities, healthcare, critical infrastructure and more, setting the stage for widespread worm attacks.π Read
via "Threatpost".
Threat Post
βURGENT/11β Critical Infrastructure Bugs Threaten EternalBlue-Style Attacks
Researchers have uncovered easy-to-exploit bugs that can impact physical safety, utilities, healthcare devices and more, setting the stage for widespread worm attacks.
π Vulnerability in VxWorks RTOS allows attackers to control internal networks π
π Read
via "Security on TechRepublic".
Internet-connected devices powered by VxWorks 6.5 and newer are affected by a vulnerability that allows remote attackers full control over targeted devices.π Read
via "Security on TechRepublic".
TechRepublic
Vulnerability in VxWorks RTOS allows attackers to control internal networks
Internet-connected devices powered by VxWorks 6.5 and newer are affected by a vulnerability that allows remote attackers full control over targeted devices.
β Cloud Security Concerns Loom for 93% of Businesses Adopting Apps and BYOD β
π Read
via "Threatpost".
Threatpost talks to Jacob Serpa with Bitglass about how more enterprises are struggling with a cloud security conundrum when it comes to public cloud vs on prem.π Read
via "Threatpost".
Threat Post
Cloud Security Concerns Loom for 93% of Businesses Adopting Apps and BYOD
Threatpost talks to Jacob Serpa with Bitglass about how more enterprises are struggling with a cloud security conundrum when it comes to public cloud vs on prem.
ATENTIONβΌ New - CVE-2016-10766
π Read
via "National Vulnerability Database".
edx-platform before 2016-06-06 allows CSRF.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10765
π Read
via "National Vulnerability Database".
edx-platform before 2016-06-10 allows account activation with a spoofed e-mail address.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9288
π Read
via "National Vulnerability Database".
The Unity Web Player plugin before 4.6.6f2 and 5.x before 5.0.3f2 allows attackers to read messages or access online services via a victim's credentialsπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-6960
π Read
via "National Vulnerability Database".
edx-platform before 2015-09-17 allows XSS via a team name.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-6253
π Read
via "National Vulnerability Database".
edx-platform before 2015-08-17 allows XSS in the Studio listing of courses.π Read
via "National Vulnerability Database".