β Space agency uses Raspberry Pi to solve satellite encryption puzzle β
π Read
via "Naked Security".
The European Space Agency thinks it's found a much cheaper way to control a small module - and it's built around a tiny Raspberry Pi Zero board.π Read
via "Naked Security".
Naked Security
Space agency uses Raspberry Pi to solve satellite encryption puzzle
The European Space Agency thinks itβs found a cheaper way to control a small module β and itβs built around a tiny Raspberry Pi Zero.
β Apple Suspends Siri Program After Privacy Backlash β
π Read
via "Threatpost".
Apple's Siri follows Amazon Alexa and Google Home in facing backlash for its data retention policies.π Read
via "Threatpost".
Threat Post
Apple Suspends Siri Program After Privacy Backlash
Apple's Siri follows Amazon Alexa and Google Home in facing backlash for its data retention policies.
β 90% of Enterprise iPhone Users Open to iMessage Spy Attack β
π Read
via "Threatpost".
Vast majority of Apple iOS users haven't updated to iOS 12.4, leaving themselves wide open to a public exploit.π Read
via "Threatpost".
Threat Post
90% of Enterprise iPhone Users Open to iMessage Spy Attack
Vast majority of Apple iOS users haven't updated to iOS 12.4, leaving themselves wide open to a public exploit.
π΄ Black Hat: A Summer Break from the Mundane and Uncontrollable π΄
π Read
via "Dark Reading: ".
Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2014-8184
π Read
via "National Vulnerability Database".
A vulnerability was found in liblouis, versions 2.5.x before 2.5.4. A stack-based buffer overflow was found in findTable() in liblouis. An attacker could create a malicious file that would cause applications that use liblouis (such as Orca) to crash, or potentially execute arbitrary code when opened.π Read
via "National Vulnerability Database".
π΄ Black Hat: A Summer Break from the Mundane and Controllable π΄
π Read
via "Dark Reading: ".
Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π Friday Five: 8/2 Edition π
π Read
via "Subscriber Blog RSS Feed ".
A trio of breaches, the plight of IT budgets in the U.K., and hackers hitting school districts - catch up on the week's news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 8/2 Edition
A trio of breaches, the plight of IT budgets in the U.K., and hackers hitting school districts - catch up on the week's news with this roundup!
β S2 Ep2: EvilGnome, leaky browser add-ons and BlueKeep β Naked Security Podcast β
π Read
via "Naked Security".
Listen to the latest episode now!π Read
via "Naked Security".
Naked Security
S2 Ep2: EvilGnome, leaky browser add-ons and BlueKeep β Naked Security Podcast
Listen to the latest episode now!
π΄ Capital One: What We Should Learn This Time π΄
π Read
via "Dark Reading: ".
Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.π Read
via "Dark Reading: ".
Darkreading
Capital One: What We Should Learn This Time
Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.
β Nation-State APTs Target U.S. Utilities With Dangerous Malware β
π Read
via "Threatpost".
Researchers spotted the never-before-seen LookBack malware being used in spearphishing campaigns against three U.S. utilities.π Read
via "Threatpost".
Threat Post
Nation-State APTs Target U.S. Utilities With Dangerous Malware
Researchers spotted the never-before-seen LookBack malware being used in spearphishing campaigns against three U.S. utilities.
β Critical Bug in Android Antivirus Exposes Address Books β
π Read
via "Threatpost".
Comprehensive testing of 21 free Android antivirus apps revealed big security vulnerabilities and privacy concerns; especially for AEGISLAB, BullGuard, dfndr and VIPRE.π Read
via "Threatpost".
Threat Post
Critical Bug in Android Antivirus Exposes Address Books
Comprehensive testing of 21 free Android antivirus apps revealed big security vulnerabilities and privacy concerns; especially for AEGISLAB, BullGuard, dfndr and VIPRE.
π΄ Learn to Safeguard Critical Industrial Targets at Black Hat USA π΄
π Read
via "Dark Reading: ".
Cybersecurity experts will share their latest insights and strategies for protecting industrial sites and equipment, from electric motors to satellites.π Read
via "Dark Reading: ".
Dark Reading
Learn to Safeguard Critical Industrial Targets at Black Hat USA
Cybersecurity experts will share their latest insights and strategies for protecting industrial sites and equipment, from electric motors to satellites.
π΄ US Utilities Hit with Phishing Attack π΄
π Read
via "Dark Reading: ".
An email phishing attack, thought to be from a nation-state actor, claims that engineers have failed licensing exams.π Read
via "Dark Reading: ".
Darkreading
US Utilities Hit with Phishing Attack
An email phishing attack, thought to be from a nation-state actor, claims that engineers have failed licensing exams.
π΄ Black Hat: A Summer Break from the Mundane and Controllable π΄
π Read
via "Dark Reading: ".
Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.π Read
via "Dark Reading: ".
Dark Reading
Black Hat
The Global Leader in Cybersecurity Events & Trainings
β Monday review β the hot 20 stories of the week β
π Read
via "Naked Security".
From NAS targeted by brute force ransomware attacks to the humans who hear your Siri recordings, catch with everything we've written in the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 20 stories of the week
From NAS targeted by brute force ransomware attacks to the humans who hear your Siri recordings, catch with everything weβve written in the last seven days β itβs weekly roundup tβ¦
π΄ How to Keep Your Web Servers Secure π΄
π Read
via "Dark Reading: ".
The good news is that Web servers have come a long way in terms of security. But to err is human, even for IT and security people.π Read
via "Dark Reading: ".
Dark Reading
How to Keep Your Web Servers Secure
The good news is that Web servers have come a long way in terms of security. But to err is human, even for IT and security people.
π΄ Dark Reading News Desk Live at Black Hat USA 2019 π΄
π Read
via "Dark Reading: ".
Watch right here for more than 30 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.π Read
via "Dark Reading: ".
Darkreading
Dark Reading News Desk Live at Black Hat USA 2019
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
β MegaCortex Ransomware Revamps for Mass Distribution β
π Read
via "Threatpost".
Manual steps have been replaced by automation.π Read
via "Threatpost".
Threat Post
MegaCortex Ransomware Revamps for Mass Distribution
Manual steps have been replaced by automation.
π How to prevent destructive malware attacks on your business: 7 tips π
π Read
via "Security on TechRepublic".
Destructive attacks cost multinational companies $239 million on average, far more than the cost of a data breach, according to IBM X-Force.π Read
via "Security on TechRepublic".
TechRepublic
How to prevent destructive malware attacks on your business: 7 tips
Destructive attacks cost multinational companies $239 million on average, far more than the cost of a data breach, according to IBM X-Force.