β Hacked devices can be turned into acoustic weapons β
π Read
via "Naked Security".
Security researcher Matt Wixey found that many gadgets aren't protected from being turned into hearing-damaging weapons. Or melting.π Read
via "Naked Security".
Naked Security
Hacked devices can be turned into acoustic weapons
Security researcher Matt Wixey found that many gadgets arenβt protected from being turned into hearing-damaging weapons. Or melting.
π΄ History Doesn't Repeat Itself in Cyberspace π΄
π Read
via "Dark Reading: ".
The 10th anniversary of the US Cyber Command is an opportunity to prepare for unknowns in the rapidly changing cybersecurity landscape.π Read
via "Dark Reading: ".
Dark Reading
History Doesn't Repeat Itself in Cyberspace
The 10th anniversary of the US Cyber Command is an opportunity to prepare for unknowns in the rapidly changing cybersecurity landscape.
β British Airways E-Ticketing Flaw Exposes Passenger Flight, Personal Data β
π Read
via "Threatpost".
A vulnerability in British Airways' e-ticketing system could enable a bad actor to view passengers' personal data or change their booking information.π Read
via "Threatpost".
Threat Post
British Airways E-Ticketing Flaw Exposes Passenger Flight, Personal Data
A vulnerability in British Airways' e-ticketing system could enable a bad actor to view passengers' personal data or change their booking information.
β Fake news doesnβt (always) fool mice β
π Read
via "Naked Security".
Mice can interpret speech phonemes correctly up to 80% of the time without falling for semantic hoodwinks like humans do.π Read
via "Naked Security".
Naked Security
Fake news doesnβt (always) fool mice
Mice can interpret speech phonemes correctly up to 80% of the time without falling for semantic hoodwinks like humans do.
π 20 terrifying uses of artificial intelligence π
π Read
via "Security on TechRepublic".
Many advances in artificial intelligence are innovative and extraordinary, but some are downright creepy. Here are 20 of the eeriest ways people are using, or could use, AI.π Read
via "Security on TechRepublic".
TechRepublic
20 terrifying uses of artificial intelligence | TechRepublic
Many advances in artificial intelligence are innovative and extraordinary, but some are downright creepy. Here are 20 of the eeriest ways people are using, or could use, AI.
π Android Q: Cheat sheet π
π Read
via "Security on TechRepublic".
Android Q's features will transform some phones into more user-friendly, customizable, and secure environments. Here's what developers, businesses, and users need to know about Google's Android 10.0.π Read
via "Security on TechRepublic".
TechRepublic
Android 10: Cheat sheet
Android 10's features will transform some phones into more user-friendly, customizable, and secure environments. Here's what developers, businesses, and users need to know about Google's Android 10.0.
π΄ 700K Guest Records Stolen in Choice Hotels Breach π΄
π Read
via "Dark Reading: ".
Cybercriminals reportedly stole the information from an exposed MongoDB database on a third-party server.π Read
via "Dark Reading: ".
Darkreading
700K Guest Records Stolen in Choice Hotels Breach
Cybercriminals reportedly stole the information from an exposed MongoDB database on a third-party server.
β Cerberus Enters the Android Malware Rental Scene β
π Read
via "Threatpost".
The mobile banking trojan has a few unusual features and bears watching, researchers said.π Read
via "Threatpost".
Threat Post
Cerberus Enters the Android Malware Rental Scene
The mobile banking trojan has a few unusual features and bears watching, researchers said.
π΄ The California Consumer Privacy Act's Hidden Surprise Has Big Legal Consequences π΄
π Read
via "Dark Reading: ".
The CCPA's provision devoted to 'reasonable' cybersecurity procedures and policies could trip up your business. Get ready now.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2015-9302
π Read
via "National Vulnerability Database".
The simple-fields plugin before 1.4.11 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9301
π Read
via "National Vulnerability Database".
The liveforms plugin before 3.2.0 for WordPress has SQL injection.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9300
π Read
via "National Vulnerability Database".
The events-manager plugin before 5.5.7 for WordPress has multiple XSS issues.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9299
π Read
via "National Vulnerability Database".
The events-manager plugin before 5.5.7.1 for WordPress has DOM XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9298
π Read
via "National Vulnerability Database".
The events-manager plugin before 5.6 for WordPress has code injection.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9297
π Read
via "National Vulnerability Database".
The events-manager plugin before 5.6 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9296
π Read
via "National Vulnerability Database".
The download-monitor plugin before 1.7.1 for WordPress has XSS related to add_query_arg.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9295
π Read
via "National Vulnerability Database".
The contact-form-plugin plugin before 3.96 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9294
π Read
via "National Vulnerability Database".
The all-in-one-wp-security-and-firewall plugin before 3.9.5 for WordPress has XSS in add_query_arg and remove_query_arg function instances.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9293
π Read
via "National Vulnerability Database".
The all-in-one-wp-security-and-firewall plugin before 3.9.8 for WordPress has XSS in the unlock request feature.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-7475
π Read
via "National Vulnerability Database".
The contact-form-plugin plugin before 3.52 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-6713
π Read
via "National Vulnerability Database".
The job-manager plugin before 0.7.19 for WordPress has multiple XSS issues.π Read
via "National Vulnerability Database".