π΄ Apple iOS Flaw Could Give Attacker Access via iMessage π΄
π Read
via "Dark Reading: ".
Google Project Zero researchers found an iOS vulnerability that could let an attacker snoop on a victim's phone remotely.π Read
via "Dark Reading: ".
Darkreading
Apple iOS Flaw Could Give Attacker Access via iMessage
Google Project Zero researchers found an iOS vulnerability that could let an attacker snoop on a victim's phone remotely.
ATENTIONβΌ New - CVE-2017-18381
π Read
via "National Vulnerability Database".
The installation process in Open edX before 2017-01-10 exposes a MongoDB instance to external connections with default credentials.π Read
via "National Vulnerability Database".
β DHS Warning: Small Aircraft are Ripe for Hacking β
π Read
via "Threatpost".
Hackers with physical access to small aircraft can easily hack the plane's CAN bus system and take control of key navigation systems.π Read
via "Threatpost".
Threat Post
DHS Warning: Small Aircraft are Ripe for Hacking
Hackers with physical access to small aircraft can easily hack the plane's CAN bus system and take control of the navigation systems.
π΄ New AT&T Cybersecurity Managed Threat Detection and Response service π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
New AT&T Cybersecurity Managed Threat Detection and Response service
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
π΄ Container Security Is Falling Behind Container Deployments π΄
π Read
via "Dark Reading: ".
Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey.π Read
via "Dark Reading: ".
Darkreading
Container Security Is Falling Behind Container Deployments
Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey.
β Cyberattacks on connected cars could gridlock entire cities β
π Read
via "Naked Security".
It would require taking over and stranding 20% of a city's cars to freeze traffic, and only 10% to impede ambulances, physicists calculate.π Read
via "Naked Security".
Naked Security
Cyberattacks on connected cars could gridlock entire cities
It would require taking over and stranding 20% of a cityβs cars to freeze traffic, and only 10% to impede ambulances, physicists calculate.
π΄ Keep Your Eye on Digital Certificates π΄
π Read
via "Dark Reading: ".
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.π Read
via "Dark Reading: ".
Dark Reading
Keep Your Eye on Digital Certificates
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
π SanDisk's SSD Dashboard uses hardcoded password, lacks encrypted updates π
π Read
via "Security on TechRepublic".
Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution.π Read
via "Security on TechRepublic".
TechRepublic
SanDisk's SSD Dashboard uses hardcoded password, lacks encrypted updates
Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution.
π iOS and Android patched 440 security vulnerabilities in 2019, so far π
π Read
via "Security on TechRepublic".
Android patched more CVEs than Apple did, according to a Zimperium report.π Read
via "Security on TechRepublic".
TechRepublic
iOS and Android patched 440 security vulnerabilities in 2019, so far
Android patched more CVEs than Apple did, according to a Zimperium report.
π Capital One is not alone: 3.5B malicious login attacks target banks and customers π
π Read
via "Security on TechRepublic".
Phishing and credential stuffing attacks are top threats to financial services organizations and customers, according to Akamai.π Read
via "Security on TechRepublic".
TechRepublic
Capital One is not alone: 3.5B malicious login attacks target banks and customers
Phishing and credential stuffing attacks are top threats to financial services organizations and customers, according to Akamai.
β Black Hat USA 2019 Preview β
π Read
via "Threatpost".
Threatpost editors discuss the top trends, keynotes and sessions that they look forward to at Black Hat USA and DEF CON 2019.π Read
via "Threatpost".
Threat Post
Black Hat USA 2019 Preview
Threatpost editors discuss the top trends, keynotes and sessions that they look forward to at Black Hat USA and DEF CON 2019.
β Georgia hit with malware yet again β
π Read
via "Naked Security".
The Department of Public Safety says it won't pay, but given the umpteen times the state's agencies have been hit, somebody's not listening.π Read
via "Naked Security".
Naked Security
Georgia hit with malware yet again
The Department of Public Safety says it wonβt pay, but given the umpteen times the stateβs agencies have been hit, somebodyβs not listening.
β iMessage bug could have allowed attackers to read data from any iPhone β
π Read
via "Naked Security".
Google's Project Zero has unveiled details of a bug in Apple's iMessage that lets attackers read data from an iPhone without any user interaction.π Read
via "Naked Security".
Naked Security
iMessage bug could have allowed attackers to read data from any iPhone
Googleβs Project Zero has unveiled details of a bug in Appleβs iMessage that lets attackers read data from an iPhone without any user interaction.
π 5 experimental cybersecurity trends your business needs to know about π
π Read
via "Security on TechRepublic".
These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights.π Read
via "Security on TechRepublic".
TechRepublic
5 experimental cybersecurity trends your business needs to know about
These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights.
π΄ 8 Free Tools to Be Showcased at Black Hat and DEF CON π΄
π Read
via "Dark Reading: ".
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.π Read
via "Dark Reading: ".
Darkreading
8 Free Tools to Be Showcased at Black Hat and DEF CON
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.
β Trivial Bug Turns Home Security Cameras Into Listening Posts β
π Read
via "Threatpost".
Anyone can listen to the camera's audio over the internet.π Read
via "Threatpost".
Threat Post
Trivial Bug Turns Home Security Cameras Into Listening Posts
Anyone can listen to the camera's audio over the internet.
β Chrome 76 Dumps Default Adobe Flash Player Support β
π Read
via "Threatpost".
In addition, Googleβs latest Chrome version implements 43 new security fixes.π Read
via "Threatpost".
Threat Post
Chrome 76 Dumps Default Adobe Flash Player Support
In addition, Googleβs latest Chrome version implements 43 new security fixes.
ATENTIONβΌ New - CVE-2018-16860
π Read
via "National Vulnerability Database".
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.π Read
via "National Vulnerability Database".
β βUrgent/11β flaws affect 200 million devices β from routers to elevators β
π Read
via "Naked Security".
There are 11 security flaws affecting VxWorks: βthe most widely used operating system you may never have heard aboutβ.π Read
via "Naked Security".
Naked Security
βUrgent/11β flaws affect 200 million devices β from routers to elevators
There are 11 security flaws affecting VxWorks: βthe most widely used operating system you may never have heard aboutβ.