β DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover β
π Read
via "Threatpost".
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.π Read
via "Threatpost".
Threat Post
DEF CON 2019: Delta ICS Flaw Allows Total Industrial Takeover
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.
β Hack of High-End Hotel Smart Locks Shows IoT Security Fail β
π Read
via "Threatpost".
LAS VEGAS β A vulnerability in a popular IoT lock key β used chiefly by a high-end hotel in Europe β allowed researchers to break into hotel rooms. The locks in question are dubbed βmobile keysβ because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and [β¦]π Read
via "Threatpost".
Threat Post
Hack of High-End Hotel Smart Locks Shows IoT Security Fail
Researchers developed an exploit that allowed them to perform an array of malicious functions against so called "mobile keys".
π΄ State Farm Reports Credential-Stuffing Attack π΄
π Read
via "Dark Reading: ".
The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.π Read
via "Dark Reading: ".
Darkreading
State Farm Reports Credential-Stuffing Attack
The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.
π΄ New Vulnerability Risk Model Promises More-Efficient Security π΄
π Read
via "Dark Reading: ".
Taking into account more factors than the current CVSS makes for a better assessment of actual danger.π Read
via "Dark Reading: ".
Dark Reading
New Vulnerability Risk Model Promises More-Efficient Security
Taking into account more factors than the current CVSS makes for a better assessment of actual danger.
β DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo β
π Read
via "Threatpost".
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.π Read
via "Threatpost".
Threat Post
DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.
β DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack β
π Read
via "Threatpost".
Researchers exploit a SQLite memory corruption issue outside of a browser.π Read
via "Threatpost".
Threat Post
DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack
Researchers exploit a SQLite memory corruption issue outside of a browser.
β Driver Disaster: Over 40 Signed Drivers Canβt Pass Security Muster β
π Read
via "Threatpost".
Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.π Read
via "Threatpost".
Threat Post
Driver Disaster: Over 40 Signed Drivers Canβt Pass Security Muster
Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.
β DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR β
π Read
via "Threatpost".
Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.π Read
via "Threatpost".
Threat Post
DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR
Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.
π Top 10 IT trends of the last 20 years π
π Read
via "Security on TechRepublic".
Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how much has changed in the IT office since 2000.π Read
via "Security on TechRepublic".
TechRepublic
Top 10 IT trends of the last 20 years
Two decades ago some people still used dial-up modems, and now the world is at our fingertips. Read on to get a sense of how much has changed in the IT office since 2000.
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
This week: hijacked home routers, SMS spam and time to update your iPhone. Catch up with everything we've written in the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
This week: hijacked home routers, SMS spam and time to update your iPhone. Catch up with everything weβve written in the last seven days β itβs weekly roundup time.
π΄ Modern-Day SOCs: People, Process & Technology π΄
π Read
via "Dark Reading: ".
As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.π Read
via "Dark Reading: ".
Dark Reading
Modern-Day SOCs: People, Process & Technology
As businesses look to the future and invest in next-generation tools, here are some considerations for more effective planning.
β GDPR privacy can be defeated using right of access requests β
π Read
via "Naked Security".
A British researcher has uncovered an ironic, gaping security hole in the EUβs General Data Protection Regulation (GDPR) - right of access requests.π Read
via "Naked Security".
Naked Security
GDPR privacy can be defeated using right of access requests
A British researcher has uncovered an ironic, gaping security hole in the EUβs General Data Protection Regulation (GDPR) β right of access requests.
β Facebook facial recognition: class action suit gets courtβs go ahead β
π Read
via "Naked Security".
The court said facial recognition could well harm privacy rights, given its βdetailed, encyclopedic, and effortlessly compiledβ biometrics collection.π Read
via "Naked Security".
Naked Security
Facebook facial recognition: class action suit gets courtβs go ahead
The court said facial recognition could well harm privacy rights, given its βdetailed, encyclopedic, and effortlessly compiledβ biometrics collection.
β Apple will hand out unlocked iPhones to vetted researchers β
π Read
via "Naked Security".
It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.π Read
via "Naked Security".
Naked Security
Apple will hand out unlocked iPhones to vetted researchers
It formalizes the reality: βpre-jailbrokenβ iPhones were already on the black market.
π΄ This Week in Web Application Attacks and Enterprise Threats π΄
π Read
via "Dark Reading: ".
The latest on the number of attacks, types of attacks, and threats to enterprises' most critical IT infrastructure.π Read
via "Dark Reading: ".
Dark Reading
This Week in Web Application Attacks and Enterprise Threats
The latest on the number of attacks, types of attacks, and threats to enterprises' most critical IT infrastructure.
π΄ Is My Development Environments at Risk? π΄
π Read
via "Dark Reading: ".
Development environments pose a few unique risks to the organization.π Read
via "Dark Reading: ".
Dark Reading
Is My Development Environments at Risk?
Development environments pose a few unique risks to the organization.
π΄ Is My Development Environments at Risk? π΄
π Read
via "Dark Reading: ".
Development environments pose a few unique risks to the organization.π Read
via "Dark Reading: ".
Dark Reading
Is My Development Environment at Risk?
Development environments pose a few unique risks to the organization.
π΄ 6 Security Considerations for Wrangling IoT π΄
π Read
via "Dark Reading: ".
The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.π Read
via "Dark Reading: ".
Darkreading
6 Security Considerations for Wrangling IoT
The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.
π The unbelievable life story of Frank Abagnale π
π Read
via "Security on TechRepublic".
Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Spielberg's hit Catch Me If You Can, to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.π Read
via "Security on TechRepublic".
TechRepublic
The unbelievable life story of Frank Abagnale
Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Spielberg's hit Catch Me If You Can, to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.