π΄ 6 Security Considerations for Wrangling IoT π΄
π Read
via "Dark Reading: ".
The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.π Read
via "Dark Reading: ".
Darkreading
6 Security Considerations for Wrangling IoT
The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.
π The unbelievable life story of Frank Abagnale π
π Read
via "Security on TechRepublic".
Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Spielberg's hit Catch Me If You Can, to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.π Read
via "Security on TechRepublic".
TechRepublic
The unbelievable life story of Frank Abagnale
Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Spielberg's hit Catch Me If You Can, to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.
π The unbelievable life story of Frank Abagnale π
π Read
via "Security on TechRepublic".
Tech Republic's Karen Roby sat down with Frank Abagnale, the real life inspiration behind Steven Spielberg's hit movie "Catch Me If You Can," to discuss everything from cybersecurity and credit protection to cryptocurrency and the tech he fears most.π Read
via "Security on TechRepublic".
TechRepublic
The unbelievable life story of Frank Abagnale
TechRepublic's Karen Roby sat down with Frank Abagnale, the real-life inspiration behind Steven Spielberg's hit movie Catch Me If You Can starring Leonardo DiCaprio, to discuss everything from cybersecurity and credit protection to cryptocurrency and theβ¦
β Hacking 4G hotspots β when did you last update? β
π Read
via "Naked Security".
Your 4G hotspot might seem very basic and low risk compared to your phone, but you need to keep it patched just as carefully!π Read
via "Naked Security".
Naked Security
Hacking 4G hotspots β when did you last update?
Your 4G hotspot might seem very basic and low risk compared to your phone, but you need to keep it patched just as carefully!
β Gamers Beware: Zero-Day in Steam Client Affects All Windows Users β
π Read
via "Threatpost".
Valve said it wouldn't fix an elevation-of-privilege bug that allows attackers to run any program on a target machine with high privileges.π Read
via "Threatpost".
Threat Post
Gamers Beware: Zero-Day in Steam Client Affects All Windows Users
An elevation-of-privilege bug allows attackers to run any program on a target machine with high privileges.
β Black Hat 2019 News Wrap: The Best and Worst of the Show β
π Read
via "Threatpost".
Threatpost breaks down the highs and lows from Black Hat 2019, from new vulnerabilities and industry collaboration to a scandal around a sponsored session.π Read
via "Threatpost".
Threat Post
Black Hat 2019 News Wrap: The Best and Worst of the Show
Threatpost breaks down the highs and lows from Black Hat 2019, from new vulnerabilities and industry collaboration to a scandal around a sponsored session.
ATENTIONβΌ New - CVE-2015-9306
π Read
via "National Vulnerability Database".
The wp-ultimate-csv-importer plugin before 3.8.1 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9305
π Read
via "National Vulnerability Database".
The wp-google-map-plugin plugin before 2.3.7 for WordPress has XSS related to the add_query_arg() and remove_query_arg() functions.π Read
via "National Vulnerability Database".
β Tips for Successful Zero-Trust Implementation β
π Read
via "Threatpost".
"Never trust, always verify" is a solid security concept -- but it's important to realize that putting it into practice can be complex.π Read
via "Threatpost".
Threat Post
Tips for Successful Zero-Trust Implementation
"Never trust, always verify" is a solid security concept β but it's important to realize that putting it into practice can be complex.
π Apple Opens Bug Bounty Program to All, Changes Payout Structure π
π Read
via "Subscriber Blog RSS Feed ".
At Black Hat, the head of Appleβs Security Engineering team announced new enhancements to its bug bounty program, including one vulnerability that could fetch a researcher $1M.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Apple Opens Bug Bounty Program to All, Changes Payout Structure
At Black Hat, the head of Appleβs Security Engineering team announced new enhancements to its bug bounty program, including one vulnerability that could fetch a researcher $1M.
π΄ More Focus on Security as Payment Technologies Proliferate π΄
π Read
via "Dark Reading: ".
Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.π Read
via "Dark Reading: ".
Darkreading
More Focus on Security as Payment Technologies Proliferate
Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.
ATENTIONβΌ New - CVE-2015-9304
π Read
via "National Vulnerability Database".
The ultimate-member plugin before 1.3.18 for WordPress has XSS via text input.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9303
π Read
via "National Vulnerability Database".
The simple-share-buttons-adder plugin before 6.0.0 for WordPress has XSS.π Read
via "National Vulnerability Database".
π΄ Security Pros, Congress Reps Talk National Cybersecurity at DEF CON π΄
π Read
via "Dark Reading: ".
Cybersecurity and government leaders discussed why Congress is unprepared for a major cyberattack and how the two parties can collaborate.π Read
via "Dark Reading: ".
Darkreading
Security Pros, Congress Reps Talk National Cybersecurity at DEF CON
Cybersecurity and government leaders discussed why Congress is unprepared for a major cyberattack and how the two parties can collaborate.
β 4 Dating Apps Pinpoint Usersβ Precise Locations β and Leak the Data β
π Read
via "Threatpost".
Grindr, Romeo, Recon and 3fun were found to expose users' exact locations, just by knowing a user name.π Read
via "Threatpost".
Threat Post
4 Dating Apps Pinpoint Usersβ Precise Locations β and Leak the Data
Grindr, Romeo, Recon and 3fun were found to expose users' exact locations, just by knowing a user name.
π΄ Hackers Can Hurt Victims with Noise π΄
π Read
via "Dark Reading: ".
Research presented at DEF CON shows that attackers can hijack Wi-Fi- and Bluetooth-connected speakers to produce damaging sounds.π Read
via "Dark Reading: ".
Darkreading
Hackers Can Hurt Victims with Noise
Research presented at DEF CON shows that attackers can hijack Wi-Fi- and Bluetooth-connected speakers to produce damaging sounds.
β AT&T, T-Mobile, Sprint, Verizon Blasted For Data Privacy Policies β
π Read
via "Threatpost".
A U.S. senator is giving the four telecommunications companies until Sept. 4 to outline how they plan to better protect customer data privacy.π Read
via "Threatpost".
Threat Post
AT&T, T-Mobile, Sprint, Verizon Blasted For Data Privacy Policies
A U.S. senator is giving the four telecommunications companies until Sept. 4 to outline how they plan to better protect customer data privacy.
π΄ FBI Plans to Monitor Social Media May Spark Privacy Issues π΄
π Read
via "Dark Reading: ".
A new initiative to pull data from social media platforms may clash with policies prohibiting the use of information for mass surveillance.π Read
via "Dark Reading: ".
Dark Reading
FBI Plans to Monitor Social Media May Spark Privacy Issues
A new initiative to pull data from social media platforms may clash with policies prohibiting the use of information for mass surveillance.
π΄ Security Flaws Discovered in 40 Microsoft-Certified Device Drivers π΄
π Read
via "Dark Reading: ".
Attackers can use vulnerable drivers to escalate privilege and execute malicious code in every part of the system.π Read
via "Dark Reading: ".
Darkreading
Security Flaws Discovered in 40 Microsoft-Certified Device Drivers
Attackers can use vulnerable drivers to escalate privilege and execute malicious code in every part of the system.
π Famous con man Frank Abagnale: Crime is 4,000 times easier today π
π Read
via "Security on TechRepublic".
Frank Abagnale, the real life inspiration behind the Spielberg hit movie, "Catch Me If You Can" talks to TechRepublic's Karen Roby about cybersecurity, passwords and where executives go wrong.π Read
via "Security on TechRepublic".
TechRepublic
Part 1: Famous con man Frank Abagnale: Crime is 4,000 times easier today
Frank Abagnale, the real-life inspiration behind the Steven Spielberg's hit movie Catch Me If You Can, talks to TechRepublic's Karen Roby about cybersecurity, passwords, and where executives go wrong.