β Facebook facial recognition: class action suit gets courtβs go ahead β
π Read
via "Naked Security".
The court said facial recognition could well harm privacy rights, given its βdetailed, encyclopedic, and effortlessly compiledβ biometrics collection.π Read
via "Naked Security".
Naked Security
Facebook facial recognition: class action suit gets courtβs go ahead
The court said facial recognition could well harm privacy rights, given its βdetailed, encyclopedic, and effortlessly compiledβ biometrics collection.
β Apple will hand out unlocked iPhones to vetted researchers β
π Read
via "Naked Security".
It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.π Read
via "Naked Security".
Naked Security
Apple will hand out unlocked iPhones to vetted researchers
It formalizes the reality: βpre-jailbrokenβ iPhones were already on the black market.
π΄ This Week in Web Application Attacks and Enterprise Threats π΄
π Read
via "Dark Reading: ".
The latest on the number of attacks, types of attacks, and threats to enterprises' most critical IT infrastructure.π Read
via "Dark Reading: ".
Dark Reading
This Week in Web Application Attacks and Enterprise Threats
The latest on the number of attacks, types of attacks, and threats to enterprises' most critical IT infrastructure.
π΄ Is My Development Environments at Risk? π΄
π Read
via "Dark Reading: ".
Development environments pose a few unique risks to the organization.π Read
via "Dark Reading: ".
Dark Reading
Is My Development Environments at Risk?
Development environments pose a few unique risks to the organization.
π΄ Is My Development Environments at Risk? π΄
π Read
via "Dark Reading: ".
Development environments pose a few unique risks to the organization.π Read
via "Dark Reading: ".
Dark Reading
Is My Development Environment at Risk?
Development environments pose a few unique risks to the organization.
π΄ 6 Security Considerations for Wrangling IoT π΄
π Read
via "Dark Reading: ".
The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.π Read
via "Dark Reading: ".
Darkreading
6 Security Considerations for Wrangling IoT
The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.
π The unbelievable life story of Frank Abagnale π
π Read
via "Security on TechRepublic".
Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Spielberg's hit Catch Me If You Can, to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.π Read
via "Security on TechRepublic".
TechRepublic
The unbelievable life story of Frank Abagnale
Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Spielberg's hit Catch Me If You Can, to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.
π The unbelievable life story of Frank Abagnale π
π Read
via "Security on TechRepublic".
Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Steven Spielberg's hit movie "Catch Me If You Can," to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.π Read
via "Security on TechRepublic".
TechRepublic
The unbelievable life story of Frank Abagnale
TechRepublic's Karen Roby sat down with Frank Abagnale, the real-life inspiration behind Steven Spielberg's hit movie Catch Me If You Can starring Leonardo DiCaprio, to discuss everything from cybersecurity and credit protection to cryptocurrency and theβ¦
β Hacking 4G hotspots β when did you last update? β
π Read
via "Naked Security".
Your 4G hotspot might seem very basic and low risk compared to your phone, but you need to keep it patched just as carefully!π Read
via "Naked Security".
Naked Security
Hacking 4G hotspots β when did you last update?
Your 4G hotspot might seem very basic and low risk compared to your phone, but you need to keep it patched just as carefully!
β Gamers Beware: Zero-Day in Steam Client Affects All Windows Users β
π Read
via "Threatpost".
Valve said it wouldn't fix an elevation-of-privilege bug that allows attackers to run any program on a target machine with high privileges.π Read
via "Threatpost".
Threat Post
Gamers Beware: Zero-Day in Steam Client Affects All Windows Users
An elevation-of-privilege bug allows attackers to run any program on a target machine with high privileges.
β Black Hat 2019 News Wrap: The Best and Worst of the Show β
π Read
via "Threatpost".
Threatpost breaks down the highs and lows from Black Hat 2019, from new vulnerabilities and industry collaboration to a scandal around a sponsored session.π Read
via "Threatpost".
Threat Post
Black Hat 2019 News Wrap: The Best and Worst of the Show
Threatpost breaks down the highs and lows from Black Hat 2019, from new vulnerabilities and industry collaboration to a scandal around a sponsored session.
ATENTIONβΌ New - CVE-2015-9306
π Read
via "National Vulnerability Database".
The wp-ultimate-csv-importer plugin before 3.8.1 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9305
π Read
via "National Vulnerability Database".
The wp-google-map-plugin plugin before 2.3.7 for WordPress has XSS related to the add_query_arg() and remove_query_arg() functions.π Read
via "National Vulnerability Database".
β Tips for Successful Zero-Trust Implementation β
π Read
via "Threatpost".
"Never trust, always verify" is a solid security concept -- but it's important to realize that putting it into practice can be complex.π Read
via "Threatpost".
Threat Post
Tips for Successful Zero-Trust Implementation
"Never trust, always verify" is a solid security concept β but it's important to realize that putting it into practice can be complex.
π Apple Opens Bug Bounty Program to All, Changes Payout Structure π
π Read
via "Subscriber Blog RSS Feed ".
At Black Hat, the head of Appleβs Security Engineering team announced new enhancements to its bug bounty program, including one vulnerability that could fetch a researcher $1M.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Apple Opens Bug Bounty Program to All, Changes Payout Structure
At Black Hat, the head of Appleβs Security Engineering team announced new enhancements to its bug bounty program, including one vulnerability that could fetch a researcher $1M.
π΄ More Focus on Security as Payment Technologies Proliferate π΄
π Read
via "Dark Reading: ".
Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.π Read
via "Dark Reading: ".
Darkreading
More Focus on Security as Payment Technologies Proliferate
Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.
ATENTIONβΌ New - CVE-2015-9304
π Read
via "National Vulnerability Database".
The ultimate-member plugin before 1.3.18 for WordPress has XSS via text input.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9303
π Read
via "National Vulnerability Database".
The simple-share-buttons-adder plugin before 6.0.0 for WordPress has XSS.π Read
via "National Vulnerability Database".
π΄ Security Pros, Congress Reps Talk National Cybersecurity at DEF CON π΄
π Read
via "Dark Reading: ".
Cybersecurity and government leaders discussed why Congress is unprepared for a major cyberattack and how the two parties can collaborate.π Read
via "Dark Reading: ".
Darkreading
Security Pros, Congress Reps Talk National Cybersecurity at DEF CON
Cybersecurity and government leaders discussed why Congress is unprepared for a major cyberattack and how the two parties can collaborate.