π Black Hat 2019: Social media influence campaigns, ATM hacking, and big business π
π Read
via "Security on TechRepublic".
TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.π Read
via "Security on TechRepublic".
TechRepublic
Black Hat 2019 trends: Social media influence campaigns, big business, ATM hacking
TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.
π Black Hat 2019 trends: Social media influence campaigns, big business, ATM hacking π
π Read
via "Security on TechRepublic".
TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.π Read
via "Security on TechRepublic".
TechRepublic
Black Hat 2019 trends: Social media influence campaigns, big business, ATM hacking
TechRepublic's Karen Roby interviews Dan Patterson about the top trends at the Black Hat USA 2019 cybersecurity conference.
π Microsoft's new vulnerability tracking service is about IT productivity π
π Read
via "Security on TechRepublic".
With so many threats and vulnerabilities to deal with, just knowing which actions you should prioritize can be hard. The new Threat & Vulnerability Management service from Microsoft should help.π Read
via "Security on TechRepublic".
β Your Skype Translator calls may be heard by humans β
π Read
via "Naked Security".
A Skype Translator insider claims it's good because humans are listening in and helping to train its artificial intelligence.π Read
via "Naked Security".
Naked Security
Your Skype Translator calls may be heard by humans
A Skype Translator insider claims itβs good because humans are listening in and helping to train its artificial intelligence.
β Election Security Threats: From Misinformation to Voting Machine Flaws β
π Read
via "Threatpost".
From insecure voting machines to social media misinformation, governments have alot to think about when it comes to securing elections.π Read
via "Threatpost".
Threat Post
Election Security Threats: From Misinformation to Voting Machine Flaws
From insecure voting machines to social media misinformation, governments have alot to think about when it comes to securing elections.
β Parents, itβs time to delete Pet Chat from your childβs LeapPad β
π Read
via "Naked Security".
LeapFrog has done lots to fix the security of the LeapPad. Now all that's left is for parents to scrape Pet Chat off of older tablets.π Read
via "Naked Security".
Naked Security
Parents, itβs time to delete Pet Chat from your childβs LeapPad
LeapFrog has done lots to fix the security of the LeapPad. Now all thatβs left is for parents to scrape Pet Chat off of older tablets.
β Instagram boots ad partner for location tracking and scraping stories β
π Read
via "Naked Security".
A βpreferred Facebook Marketing Partnerβ is alleged to have tracked millions of Instagram users' locations and stories.π Read
via "Naked Security".
Naked Security
Instagram boots ad partner for location tracking and scraping stories
A βpreferred Facebook Marketing Partnerβ is alleged to have tracked millions of Instagram usersβ locations and stories.
π΄ It's (Still) the Password, Stupid! π΄
π Read
via "Dark Reading: ".
The best way to protect your identity in cyberspace is the simplest: Use a variety of strong passwords, and never, ever, use "123456" no matter how easy it is to type.π Read
via "Dark Reading: ".
Dark Reading
It's (Still) the Password, Stupid!
The best way to protect your identity in cyberspace is the simplest: Use a variety of strong passwords, and never, ever, use "123456" no matter how easy it is t
β Blackmailed for Bitcoin β exchange rebuffs $3.5m ransom demand β
π Read
via "Naked Security".
Here's a story of super-sized digital blackmail aimed at one of the biggest cryptocoin exchanges out there.π Read
via "Naked Security".
Naked Security
Blackmailed for Bitcoin β exchange rebuffs $3.5m ransom demand
Hereβs a story of super-sized digital blackmail aimed at one of the biggest cryptocoin exchanges out there.
π Why remote workers are an underrated security risk for small businesses π
π Read
via "Security on TechRepublic".
Despite the risk, small businesses are largely unaware of security risks associated with remote employees, according to a Nationwide survey.π Read
via "Security on TechRepublic".
TechRepublic
Why remote workers are an underrated security risk for small businesses
Despite the risk, small businesses are largely unaware of security risks associated with remote employees, according to a Nationwide survey.
β DEF CON 2019: Researchers Demo Hacking Google Home for RCE β
π Read
via "Threatpost".
Researchers show how they hacked Google Home smart speakers using the Megellan vulnerability.π Read
via "Threatpost".
Threat Post
DEF CON 2019: Researchers Demo Hacking Google Home for RCE
Researcher show how they hacked Google Home smart speakers using the Megellan vulnerability.
π΄ Significant Vulnerabilities Found in 6 Common Printers Brands π΄
π Read
via "Dark Reading: ".
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.π Read
via "Dark Reading: ".
Dark Reading
Significant Vulnerabilities Found in 6 Common Printers Brands
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.
π΄ Significant Vulnerabilities Found in 6 Common Printer Brands π΄
π Read
via "Dark Reading: ".
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.π Read
via "Dark Reading: ".
Dark Reading
Significant Vulnerabilities Found in 6 Common Printer Brands
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.
π How to automatically deny UAC elevation requests in Windows 10 π
π Read
via "Security on TechRepublic".
To install an app in Windows 10, standard level users are prompted for elevated credentials. With a few tweaks, you can change that behavior to deny such requests.π Read
via "Security on TechRepublic".
TechRepublic
How to automatically deny UAC elevation requests in Windows 10
To install an app in Windows 10, standard level users are prompted for elevated credentials. With a few tweaks, you can change that behavior to deny such requests.
π΄ 7 Online Safety Tips for College Students π΄
π Read
via "Dark Reading: ".
Heading back to campus soon? Here are seven tips that will get your digital house in order and keep you safe online this semester.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
π Friday Five: 8/9 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Twitter shares user data without permission, malware attacks are on the rise, and more - catch up on the weekβs infosec news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 8/9 Edition
Twitter shares user data without permission, malware attacks are on the rise, and more - catch up on the weekβs infosec news with this roundup!
β DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover β
π Read
via "Threatpost".
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.π Read
via "Threatpost".
Threat Post
DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.
β Hack of High-End Hotel Smart Locks Shows IoT Security Fail β
π Read
via "Threatpost".
LAS VEGAS β A vulnerability in a popular IoT lock key β used chiefly by a high-end hotel in Europe β allowed researchers to break into hotel rooms. The locks in question are dubbed βmobile keysβ because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and [β¦]π Read
via "Threatpost".
Threat Post
Hack of High-End Hotel Smart Locks Shows IoT Security Fail
Researchers developed an exploit that allowed them to perform an array of malicious functions against so called "mobile keys".
π΄ State Farm Reports Credential-Stuffing Attack π΄
π Read
via "Dark Reading: ".
The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.π Read
via "Dark Reading: ".
Darkreading
State Farm Reports Credential-Stuffing Attack
The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.
π΄ New Vulnerability Risk Model Promises More-Efficient Security π΄
π Read
via "Dark Reading: ".
Taking into account more factors than the current CVSS makes for a better assessment of actual danger.π Read
via "Dark Reading: ".
Dark Reading
New Vulnerability Risk Model Promises More-Efficient Security
Taking into account more factors than the current CVSS makes for a better assessment of actual danger.
β DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo β
π Read
via "Threatpost".
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.π Read
via "Threatpost".
Threat Post
DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.