π΄ It's (Still) the Password, Stupid! π΄
π Read
via "Dark Reading: ".
The best way to protect your identity in cyberspace is the simplest: Use a variety of strong passwords, and never, ever, use "123456" no matter how easy it is to type.π Read
via "Dark Reading: ".
Dark Reading
It's (Still) the Password, Stupid!
The best way to protect your identity in cyberspace is the simplest: Use a variety of strong passwords, and never, ever, use "123456" no matter how easy it is t
β Blackmailed for Bitcoin β exchange rebuffs $3.5m ransom demand β
π Read
via "Naked Security".
Here's a story of super-sized digital blackmail aimed at one of the biggest cryptocoin exchanges out there.π Read
via "Naked Security".
Naked Security
Blackmailed for Bitcoin β exchange rebuffs $3.5m ransom demand
Hereβs a story of super-sized digital blackmail aimed at one of the biggest cryptocoin exchanges out there.
π Why remote workers are an underrated security risk for small businesses π
π Read
via "Security on TechRepublic".
Despite the risk, small businesses are largely unaware of security risks associated with remote employees, according to a Nationwide survey.π Read
via "Security on TechRepublic".
TechRepublic
Why remote workers are an underrated security risk for small businesses
Despite the risk, small businesses are largely unaware of security risks associated with remote employees, according to a Nationwide survey.
β DEF CON 2019: Researchers Demo Hacking Google Home for RCE β
π Read
via "Threatpost".
Researchers show how they hacked Google Home smart speakers using the Megellan vulnerability.π Read
via "Threatpost".
Threat Post
DEF CON 2019: Researchers Demo Hacking Google Home for RCE
Researcher show how they hacked Google Home smart speakers using the Megellan vulnerability.
π΄ Significant Vulnerabilities Found in 6 Common Printers Brands π΄
π Read
via "Dark Reading: ".
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.π Read
via "Dark Reading: ".
Dark Reading
Significant Vulnerabilities Found in 6 Common Printers Brands
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.
π΄ Significant Vulnerabilities Found in 6 Common Printer Brands π΄
π Read
via "Dark Reading: ".
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.π Read
via "Dark Reading: ".
Dark Reading
Significant Vulnerabilities Found in 6 Common Printer Brands
In a half-year project, two researchers tested six of the top enterprise printer brands and found vulnerabilities in every device, some of which allow remote execution.
π How to automatically deny UAC elevation requests in Windows 10 π
π Read
via "Security on TechRepublic".
To install an app in Windows 10, standard level users are prompted for elevated credentials. With a few tweaks, you can change that behavior to deny such requests.π Read
via "Security on TechRepublic".
TechRepublic
How to automatically deny UAC elevation requests in Windows 10
To install an app in Windows 10, standard level users are prompted for elevated credentials. With a few tweaks, you can change that behavior to deny such requests.
π΄ 7 Online Safety Tips for College Students π΄
π Read
via "Dark Reading: ".
Heading back to campus soon? Here are seven tips that will get your digital house in order and keep you safe online this semester.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
π Friday Five: 8/9 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Twitter shares user data without permission, malware attacks are on the rise, and more - catch up on the weekβs infosec news with this roundup!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 8/9 Edition
Twitter shares user data without permission, malware attacks are on the rise, and more - catch up on the weekβs infosec news with this roundup!
β DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover β
π Read
via "Threatpost".
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.π Read
via "Threatpost".
Threat Post
DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.
β Hack of High-End Hotel Smart Locks Shows IoT Security Fail β
π Read
via "Threatpost".
LAS VEGAS β A vulnerability in a popular IoT lock key β used chiefly by a high-end hotel in Europe β allowed researchers to break into hotel rooms. The locks in question are dubbed βmobile keysβ because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and [β¦]π Read
via "Threatpost".
Threat Post
Hack of High-End Hotel Smart Locks Shows IoT Security Fail
Researchers developed an exploit that allowed them to perform an array of malicious functions against so called "mobile keys".
π΄ State Farm Reports Credential-Stuffing Attack π΄
π Read
via "Dark Reading: ".
The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.π Read
via "Dark Reading: ".
Darkreading
State Farm Reports Credential-Stuffing Attack
The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.
π΄ New Vulnerability Risk Model Promises More-Efficient Security π΄
π Read
via "Dark Reading: ".
Taking into account more factors than the current CVSS makes for a better assessment of actual danger.π Read
via "Dark Reading: ".
Dark Reading
New Vulnerability Risk Model Promises More-Efficient Security
Taking into account more factors than the current CVSS makes for a better assessment of actual danger.
β DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo β
π Read
via "Threatpost".
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.π Read
via "Threatpost".
Threat Post
DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.
β DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack β
π Read
via "Threatpost".
Researchers exploit a SQLite memory corruption issue outside of a browser.π Read
via "Threatpost".
Threat Post
DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack
Researchers exploit a SQLite memory corruption issue outside of a browser.
β Driver Disaster: Over 40 Signed Drivers Canβt Pass Security Muster β
π Read
via "Threatpost".
Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.π Read
via "Threatpost".
Threat Post
Driver Disaster: Over 40 Signed Drivers Canβt Pass Security Muster
Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.
β DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR β
π Read
via "Threatpost".
Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.π Read
via "Threatpost".
Threat Post
DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR
Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.
π Top 10 IT trends of the last 20 years π
π Read
via "Security on TechRepublic".
Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how much has changed in the IT office since 2000.π Read
via "Security on TechRepublic".
TechRepublic
Top 10 IT trends of the last 20 years
Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how much has changed in the IT office since 2000.
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
This week: hijacked home routers, SMS spam and time to update your iPhone. Catch up with everything we've written in the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
This week: hijacked home routers, SMS spam and time to update your iPhone. Catch up with everything weβve written in the last seven days β itβs weekly roundup time.
π΄ Modern-Day SOCs: People, Process & Technology π΄
π Read
via "Dark Reading: ".
As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.π Read
via "Dark Reading: ".
Dark Reading
Modern-Day SOCs: People, Process & Technology
As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.
β GDPR privacy can be defeated using right of access requests β
π Read
via "Naked Security".
A British researcher has uncovered an ironic, gaping security hole in the EUβs General Data Protection Regulation (GDPR) - right of access requests.π Read
via "Naked Security".
Naked Security
GDPR privacy can be defeated using right of access requests
A British researcher has uncovered an ironic, gaping security hole in the EUβs General Data Protection Regulation (GDPR) β right of access requests.