π΄ Keep Your Eye on Digital Certificates π΄
π Read
via "Dark Reading: ".
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.π Read
via "Dark Reading: ".
Dark Reading
Keep Your Eye on Digital Certificates
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
π SanDisk's SSD Dashboard uses hardcoded password, lacks encrypted updates π
π Read
via "Security on TechRepublic".
Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution.π Read
via "Security on TechRepublic".
TechRepublic
SanDisk's SSD Dashboard uses hardcoded password, lacks encrypted updates
Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution.
π iOS and Android patched 440 security vulnerabilities in 2019, so far π
π Read
via "Security on TechRepublic".
Android patched more CVEs than Apple did, according to a Zimperium report.π Read
via "Security on TechRepublic".
TechRepublic
iOS and Android patched 440 security vulnerabilities in 2019, so far
Android patched more CVEs than Apple did, according to a Zimperium report.
π Capital One is not alone: 3.5B malicious login attacks target banks and customers π
π Read
via "Security on TechRepublic".
Phishing and credential stuffing attacks are top threats to financial services organizations and customers, according to Akamai.π Read
via "Security on TechRepublic".
TechRepublic
Capital One is not alone: 3.5B malicious login attacks target banks and customers
Phishing and credential stuffing attacks are top threats to financial services organizations and customers, according to Akamai.
β Black Hat USA 2019 Preview β
π Read
via "Threatpost".
Threatpost editors discuss the top trends, keynotes and sessions that they look forward to at Black Hat USA and DEF CON 2019.π Read
via "Threatpost".
Threat Post
Black Hat USA 2019 Preview
Threatpost editors discuss the top trends, keynotes and sessions that they look forward to at Black Hat USA and DEF CON 2019.
β Georgia hit with malware yet again β
π Read
via "Naked Security".
The Department of Public Safety says it won't pay, but given the umpteen times the state's agencies have been hit, somebody's not listening.π Read
via "Naked Security".
Naked Security
Georgia hit with malware yet again
The Department of Public Safety says it wonβt pay, but given the umpteen times the stateβs agencies have been hit, somebodyβs not listening.
β iMessage bug could have allowed attackers to read data from any iPhone β
π Read
via "Naked Security".
Google's Project Zero has unveiled details of a bug in Apple's iMessage that lets attackers read data from an iPhone without any user interaction.π Read
via "Naked Security".
Naked Security
iMessage bug could have allowed attackers to read data from any iPhone
Googleβs Project Zero has unveiled details of a bug in Appleβs iMessage that lets attackers read data from an iPhone without any user interaction.
π 5 experimental cybersecurity trends your business needs to know about π
π Read
via "Security on TechRepublic".
These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights.π Read
via "Security on TechRepublic".
TechRepublic
5 experimental cybersecurity trends your business needs to know about
These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights.
π΄ 8 Free Tools to Be Showcased at Black Hat and DEF CON π΄
π Read
via "Dark Reading: ".
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.π Read
via "Dark Reading: ".
Darkreading
8 Free Tools to Be Showcased at Black Hat and DEF CON
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.
β Trivial Bug Turns Home Security Cameras Into Listening Posts β
π Read
via "Threatpost".
Anyone can listen to the camera's audio over the internet.π Read
via "Threatpost".
Threat Post
Trivial Bug Turns Home Security Cameras Into Listening Posts
Anyone can listen to the camera's audio over the internet.
β Chrome 76 Dumps Default Adobe Flash Player Support β
π Read
via "Threatpost".
In addition, Googleβs latest Chrome version implements 43 new security fixes.π Read
via "Threatpost".
Threat Post
Chrome 76 Dumps Default Adobe Flash Player Support
In addition, Googleβs latest Chrome version implements 43 new security fixes.
ATENTIONβΌ New - CVE-2018-16860
π Read
via "National Vulnerability Database".
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.π Read
via "National Vulnerability Database".
β βUrgent/11β flaws affect 200 million devices β from routers to elevators β
π Read
via "Naked Security".
There are 11 security flaws affecting VxWorks: βthe most widely used operating system you may never have heard aboutβ.π Read
via "Naked Security".
Naked Security
βUrgent/11β flaws affect 200 million devices β from routers to elevators
There are 11 security flaws affecting VxWorks: βthe most widely used operating system you may never have heard aboutβ.
π΄ More Companies Don't Rely on Passwords Alone Anymore π΄
π Read
via "Dark Reading: ".
New research shows how enterprises are adding additional layers of authentication.π Read
via "Dark Reading: ".
Dark Reading
More Companies Don't Rely on Passwords Alone Anymore
New research shows how enterprises are adding additional layers of authentication.
π΄ Former Twitter CISO Launches Startup to Secure Cloud Collaboration π΄
π Read
via "Dark Reading: ".
Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing.π Read
via "Dark Reading: ".
Dark Reading
Former Twitter CISO Launches Startup to Secure Cloud Collaboration
Altitude Networks, led by Michael Coates and Amir Kavousian, aims to prevent accidental and malicious file sharing.
π New Bill Aims to Better Secure U.S. IP, Supply Chain Security π
π Read
via "Subscriber Blog RSS Feed ".
The legislation, which cites a rash of Chinese IP theft, would develop a national strategy to prevent risks to U.S. tech.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New Bill Aims to Better Secure U.S. IP, Supply Chain Security
The legislation, which cites a rash of Chinese IP theft, would develop a national strategy to prevent risks to U.S. tech.
π Enterprises may be clouding up their security future π
π Read
via "Security on TechRepublic".
Security is hard enough without adding multiple clouds into the mix.π Read
via "Security on TechRepublic".
TechRepublic
Enterprises may be clouding up their security future
Security is hard enough without adding multiple clouds into the mix.
π΄ Why the Network Is Central to IoT Security π΄
π Read
via "Dark Reading: ".
Is there something fishy about your network activity? Better make sure all of your IoT devices are under control.π Read
via "Dark Reading: ".
Darkreading
Why the Network Is Central to IoT Security
Is there something strange about your network activity? Better make sure all of your IoT devices are under control.
β Hondaβs Security βSoft Spotsβ Exposed in Unsecured Database β
π Read
via "Threatpost".
A researcher said that he found a Honda ElasticSearch database exposing 40GB of internal system and device data.π Read
via "Threatpost".
Threat Post
Hondaβs Security βSoft Spotsβ Exposed in Unsecured Database
A researcher said that he found a Honda ElasticSearch database exposing 40GB of internal system and device data.