π What You Need to Know About Floridaβs Information Protection Act of 2014 (FIPA) π
π Read
via "Subscriber Blog RSS Feed ".
Learn about the Florida Information Protection Act of 2014 (FIPA) in Data Protection 101, our series on the fundamentals of data security.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
What You Need to Know About Floridaβs Information Protection Act of 2014 (FIPA)
Learn about the Florida Information Protection Act of 2014 (FIPA) in Data Protection 101, our series on the fundamentals of data security.
π΄ US Chamber of Commerce, FICO Report National Risk Score of 688 π΄
π Read
via "Dark Reading: ".
While the score was up for large businesses and down for small firms, the report urges all to prioritize third-party risk management.π Read
via "Dark Reading: ".
Darkreading
US Chamber of Commerce, FICO Report National Risk Score of 688
While the score was up for large businesses and down for small firms, the report urges all to prioritize third-party risk management.
π΄ VxWorks TCP/IP Stack Vulnerability Poses Major Manufacturing Risk π΄
π Read
via "Dark Reading: ".
A new analysis shows the scale of risk posed by networking vulnerabilities in a popular embedded real-time operating system.π Read
via "Dark Reading: ".
Dark Reading
VxWorks TCP/IP Stack Vulnerability Poses Major Manufacturing Risk
A new analysis shows the scale of risk posed by networking vulnerabilities in a popular embedded real-time operating system.
β Google Nest Security Cam Bugs Allow Device Takeover β
π Read
via "Threatpost".
Eight vulnerabilities would allow a range of attacker activities, including taking the Nest camera offline, sniffing out network information and device hijacking.π Read
via "Threatpost".
Threat Post
Google Nest Security Cam Bugs Allow Device Takeover
Eight vulnerabilities would allow a range of attacker activities, including taking the Nest camera offline, sniffing out network information and device hijacking.
π΄ Towns Across Texas Hit in Coordinated Ransomware Attack π΄
π Read
via "Dark Reading: ".
The state government and cybersecurity groups have mobilized to respond to a mass ransomware attack that simultaneously hit 23 different towns statewide.π Read
via "Dark Reading: ".
Darkreading
Towns Across Texas Hit in Coordinated Ransomware Attack
The state government and cybersecurity groups have mobilized to respond to a mass ransomware attack that simultaneously hit 22 different towns statewide.
β Post GandCrab, Cybercriminals Scouring the Dark Web for the Next Top Ransomware β
π Read
via "Threatpost".
A detailed look at underground forums shows that cybercriminals aren't sure where to look on the heels of the GandCrab ransomware group shutting its doors - and low-level actors are taking advantage of that by developing their own strains.π Read
via "Threatpost".
Threat Post
Post-GandCrab, Cybercriminals Scouring the Dark Web for the Next Top Ransomware
A detailed look at underground forums shows that cybercriminals aren't sure where to look on the heels of the GandCrab ransomware group shutting its doors - and low-level actors are taking advantage of that by developing their own strains.
β Apple Sues Corellium Over iOS βReplicaβ Security Testing Software β
π Read
via "Threatpost".
The phone company has sued the startup for copyright infringement.π Read
via "Threatpost".
Threat Post
Apple Sues Corellium Over iOS βReplicaβ Security Testing Software
The phone company has sued the startup for copyright infringement.
β VLC Media Player Allows Desktop Takeover Via Malicious Video Files β
π Read
via "Threatpost".
VideoLAN has released an updated version of its VLC Player to fix over a dozen bugs.π Read
via "Threatpost".
Threat Post
VLC Media Player Allows Desktop Takeover Via Malicious Video Files
VideoLAN has released an updated version of its VLC Player to fix over a dozen bugs.
π΄ Instagram Added to Facebook Data-Abuse Bounty Program π΄
π Read
via "Dark Reading: ".
Social media giant also launches invitation-only bug bounty program for 'Checkout on Instagram'.π Read
via "Dark Reading: ".
Dark Reading
Instagram Added to Facebook Data-Abuse Bounty Program
Social media giant also launches invitation-only bug bounty program for 'Checkout on Instagram'.
π΄ What Americans Think About Ransomware π΄
π Read
via "Dark Reading: ".
New Harris Poll survey says most will weigh candidates' cybersecurity positions.π Read
via "Dark Reading: ".
Dark Reading
What Americans Think About Ransomware
New Harris Poll survey says most will weigh candidates' cybersecurity positions.
π΄ 5 Ways to Improve the Patching Process π΄
π Read
via "Dark Reading: ".
So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams.π Read
via "Dark Reading: ".
Dark Reading
5 Ways to Improve the Patching Process
So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams.
π΄ Visa Adds New Fraud Disruption Measures π΄
π Read
via "Dark Reading: ".
Payment card giant creates a 'cyber fraud system' to thwart transaction abuse.π Read
via "Dark Reading: ".
Dark Reading
Visa Adds New Fraud Disruption Measures
Payment card giant creates a 'cyber fraud system' to thwart transaction abuse.
π΄ Cyberthreats Against Financial Services Up 56% π΄
π Read
via "Dark Reading: ".
Financial institutions interacting with customers online must prepare for a broader, more sophisticated variety of threats.π Read
via "Dark Reading: ".
Darkreading
Cyberthreats Against Financial Services Up 56%
Financial institutions interacting with customers online must prepare for a broader, more sophisticated variety of threats.
β Adwind Spyware-as-a-Service Attacks Utility Grid Operators β
π Read
via "Threatpost".
A phishing campaign targeting utility grid operators uses a PDF attachment to deliver spyware.π Read
via "Threatpost".
Threat Post
Adwind Spyware-as-a-Service Attacks Utility Grid Operators
A phishing campaign that spoofs a PDF attachment to deliver Adwind spyware has been taking aim at national grid utilities infrastructure. Adwind, a.k.a. JRAT or SockRat, is sold as a malware-as-a-service. It offers a full cadre of info-gathering featuresβ¦
β Apple iOS Patch Blunder Opens Updated iPhones to Jailbreaks β
π Read
via "Threatpost".
Apple accidentally re-introduced a vulnerability in its latest operating system, iOS 12.4, that had been previously fixed in iOS 12.3.π Read
via "Threatpost".
Threat Post
Apple iOS Patch Blunder Opens Updated iPhones to Jailbreaks
Apple accidentally re-introduced a vulnerability in its latest operating system, iOS 12.4, that had been previously fixed in iOS 12.3.
π΄ Who Gets Privileged Access & How to Enforce It π΄
π Read
via "Dark Reading: ".
Let's begin by re-evaluating IT infrastructures to determine who has access to what, why, and when.π Read
via "Dark Reading: ".
Darkreading
Who Gets Privileged Access & How to Enforce It
Let's begin by re-evaluating IT infrastructures to determine who has access to what, why, and when.
β Serious Security: Phishing in the cloud β the freemium way β
π Read
via "Naked Security".
Here's an interesting phishing trick. It's a way for crooks to get lots of customised web links without doing any programming.π Read
via "Naked Security".
Naked Security
Serious Security: Phishing in the cloud β the freemium way
Hereβs an interesting phishing trick. Itβs a way for crooks to get lots of customised web links without doing any programming.
β Scammers use bogus search results to fool voice assistants β
π Read
via "Naked Security".
The Better Business Bureau reports that scammers have worked out how to game search results for company customer support telephone numbers.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Chrome users ignoring warnings to change breached passwords β
π Read
via "Naked Security".
If you were told that the password you had just entered was known to have been compromised in a data breach, what would you do?π Read
via "Naked Security".
Naked Security
Chrome users ignoring warnings to change breached passwords
If you were told that the password you had just entered was known to have been compromised in a data breach, what would you do?
β Apple iOS update ends in jailbroken iPhones (if thatβs what you want) β
π Read
via "Naked Security".
Programmers call it "regresssion" - when fixing a new bug unfixes an old one - and it's a jailbreakers dream!π Read
via "Naked Security".
Naked Security
Apple iOS update ends in jailbroken iPhones (if thatβs what you want)
Programmers call it βregresssionβ β when fixing a new bug unfixes an old one β and itβs a jailbreakers dream!