π΄ Sextortion Email Scams Rise Sharply π΄
π Read
via "Dark Reading: ".
Cybercriminals are increasingly trying to trick people into paying ransoms by threatening to expose compromising activities to friends and family.π Read
via "Dark Reading: ".
Darkreading
Sextortion Email Scams Rise Sharply
Cybercriminals are increasingly trying to trick people into paying ransoms by threatening to expose compromising activities to friends and family.
π It's 2019, and one third of businesses still have active Windows XP deployments π
π Read
via "Security on TechRepublic".
As end of support for the still-popular Windows 7 draws near, risks of unpatched operating systems are likely to be a significant security concern in the near future.π Read
via "Security on TechRepublic".
TechRepublic
It's 2019, and one third of businesses still have active Windows XP deployments
As end of support for the still-popular Windows 7 draws near, risks of unpatched operating systems are likely to be a significant security concern in the near future.
π 12 reasons why data breaches still happen π
π Read
via "Security on TechRepublic".
Half of IT security leaders don't know if their cybersecurity tools are working, according to a report from the Ponemon Institute and AttackIQ.π Read
via "Security on TechRepublic".
TechRepublic
12 reasons why data breaches still happen
Half of IT security leaders don't know if their cybersecurity tools are working, according to a report from the Ponemon Institute and AttackIQ.
β Former AWS Engineer Arrested as Capital One Admits Massive Data Breach β
π Read
via "Threatpost".
More than 100 million customers have had their data compromised by a hacker after a cloud misconfiguration at Capital One.π Read
via "Threatpost".
Threat Post
Former AWS Engineer Arrested as Capital One Admits Massive Data Breach
More than 100 million customers have had their data compromised by a hacker after a cloud misconfiguration at Capital One.
π΄ Black Hat Q&A: Cracking Apple's T2 Security Chip π΄
π Read
via "Dark Reading: ".
Duo Labs' Mikhail Davidow and Jeremy Erickson speak about their research on the Apple T2 security chip, and why they're sharing it at Black Hat USA.π Read
via "Dark Reading: ".
Dark Reading
Black Hat Q&A: Cracking Apple's T2 Security Chip
Duo Labs' Mikhail Davidow and Jeremy Erickson speak about their research on the Apple T2 security chip, and why they're sharing it at Black Hat USA.
β Post-Equifax settlement, NY updates data breach notification laws β
π Read
via "Naked Security".
Equifax is fined $675 million, while New York data breach notification law now covers biometrics, passwords, and more.π Read
via "Naked Security".
Naked Security
Post-Equifax settlement, NY updates data breach notification laws
Equifax is fined $675 million, while New York data breach notification law now covers biometrics, passwords, and more.
β US chases fraudulent bitcoin exchange BTC-e for $100m β
π Read
via "Naked Security".
Two years ago, the US government fined an international cybercriminal and his fraudulent bitcoin exchange over $100m. Now, it's going after them for the money.π Read
via "Naked Security".
Naked Security
US chases fraudulent bitcoin exchange BTC-e for $100m
Two years ago, the US government fined an international cybercriminal and his fraudulent bitcoin exchange over $100m. Now, itβs going after them for the money.
β Listening in: Humans hear the private info Siri accidentally records β
π Read
via "Naked Security".
Apple Watch and HomePod have the highest rate of inadvertent recordings, a whistleblower says.π Read
via "Naked Security".
Naked Security
Listening in: Humans hear the private info Siri accidentally records
Apple Watch and HomePod have the highest rate of inadvertent recordings, a whistleblower says.
β Hackers target Telegram accounts through voicemail backdoor β
π Read
via "Naked Security".
As politicians should know by now, secure messaging apps such as Telegram can quickly become a double-edged sword.π Read
via "Naked Security".
Naked Security
Hackers target Telegram accounts through voicemail backdoor
As politicians should know by now, secure messaging apps such as Telegram can quickly become a double-edged sword.
ATENTIONβΌ New - CVE-2017-18380
π Read
via "National Vulnerability Database".
edx-platform before 2017-08-03 allows attackers to trigger password-reset e-mail messages in which the reset link has an attacker-controlled domain name.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9290
π Read
via "National Vulnerability Database".
In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.π Read
via "National Vulnerability Database".
π΄ CISOs Must Evolve to a Data-First Security Program π΄
π Read
via "Dark Reading: ".
Such a program will require effort and reprioritization, but it will let your company fight modern-day threats and protect your most important assets.π Read
via "Dark Reading: ".
Darkreading
CISOs Must Evolve to a Data-First Security Program
Such a program will require effort and reprioritization, but it will let your company fight modern-day threats and protect your most important assets.
π΄ Suffering SOC Saga Continues π΄
π Read
via "Dark Reading: ".
New study exposes low confidence among security professionals in their security operations centers.π Read
via "Dark Reading: ".
Dark Reading
Suffering SOC Saga Continues
New study exposes low confidence among security professionals in their security operations centers.
β Nation-State Actors Go All-In on Mobile Malware β
π Read
via "Threatpost".
Even though mobile data security is less mature than its desktop equivalent, the quality of the information on offer is top-tier.π Read
via "Threatpost".
Threat Post
Nation-State Actors Go All-In on Mobile Malware
Even though mobile data security is less mature than its desktop equivalent, the quality of the information on offer is top-tier.
π How to protect your corporate bank account after the Capital One breach: 10 tips π
π Read
via "Security on TechRepublic".
A Capital One data breach put the data of 106 million people at risk, including social security numbers and banking information.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your corporate bank account after the Capital One breach: 10 tips
A Capital One data breach put the data of 106 million people at risk, including social security numbers and banking information.
β Capital One breach β 100 million usersβ data stolen β
π Read
via "Naked Security".
Global financial services company Capital One has just announced a massive data breach.π Read
via "Naked Security".
Naked Security
Capital One breach β 100 million usersβ data stolen
Global financial services company Capital One has just announced a massive data breach.
π΄ BlueKeep Exploits Appear as Security Firms Continue to Worry About Cyberattack π΄
π Read
via "Dark Reading: ".
The lack of an attack has puzzled some security experts, but the general advice remains that companies should patch their vulnerable systems more quickly.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ DHS Warns About Security Flaws in Small Airplanes π΄
π Read
via "Dark Reading: ".
Rapid7 researchers found holes in CAN bus networks that an attacker could exploit to sabotage its operation.π Read
via "Dark Reading: ".
Dark Reading
DHS Warns About Security Flaws in Small Airplanes
Rapid7 researchers found holes in CAN bus networks that an attacker could exploit to sabotage its operation.
β Android Ransomware Spreads Via βSex Simulation Gameβ Links on Reddit, SMS β
π Read
via "Threatpost".
A new strain of ransomware is being distributed to Android users via online forums and SMS messages.π Read
via "Threatpost".
Threat Post
Android Ransomware Spreads Via βSex Simulation Gameβ Links on Reddit, SMS
A new strain of ransomware is being distributed to Android users via online forums and SMS messages.
π΄ Transforming 'Tangible Security' into a Competitive Advantage π΄
π Read
via "Dark Reading: ".
Today's consumers want to see and touch security. Meeting this demand will be a win-win for everyone, from users to vendors to security teams.π Read
via "Dark Reading: ".
Dark Reading
Transforming 'Tangible Security' into a Competitive Advantage
Today's consumers want to see and touch security. Meeting this demand will be a win-win for everyone, from users to vendors to security teams.