β Instagram tests sharing your location history with Facebook β
π Read
via "Naked Security".
Instagram is testing Facebook Location History - which allows the tracking of precise locations from your device - in its app.π Read
via "Naked Security".
Naked Security
Instagram tests sharing your location history with Facebook
Instagram is testing Facebook Location History β which allows the tracking of precise locations from your device β in its app.
β Calif. Law Takes Aim at Weak IoT Passwords β
π Read
via "The first stop for security news | Threatpost ".
Concerns over data privacy and security push California to roll out the first legislation on connected devices.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Calif. Law Takes Aim at Weak IoT Passwords
Concerns over data privacy and security push California to roll out the first legislation on connected devices.
β Fake Adobe Flash Updates Hide Malicious Crypto Miners β
π Read
via "The first stop for security news | Threatpost ".
A fake Adobe update actually updates victims' Flash - but also installs malicious cryptomining malware.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Fake Adobe Flash Updates Hide Malicious Crypto Miners
A fake Adobe update actually updates victimsβ Flash - but also installs malicious cryptomining malware.
π΄ The Better Way: Threat Analysis & IIoT Security π΄
π Read
via "Dark Reading: ".
Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
Perimeter recent news | Dark Reading
Explore the latest news and expert commentary on Perimeter, brought to you by the editors of Dark Reading
π Ohio taps college cybersecurity experts to audit election systems before 2018 midterms π
π Read
via "Security on TechRepublic".
Called 'Pathfinders,' these security officials are conducting risk assessments and mitigating vulnerabilities in voting systems.π Read
via "Security on TechRepublic".
TechRepublic
Ohio taps college cybersecurity experts to audit election systems before 2018 midterms
Called 'Pathfinders,' these security officials are conducting risk assessments and mitigating vulnerabilities in voting systems.
π΄ One-Third of US Adults Hit with Identity Theft π΄
π Read
via "Dark Reading: ".
That's double the global average and more than three times the rate of French and German adults.π Read
via "Dark Reading: ".
Dark Reading
One-Third of US Adults Hit with Identity Theft
That's double the global average and more than three times the rate of French and German adults.
β Adaptable, All-in-One Android Trojan Shows the Future of Malware β
π Read
via "The first stop for security news | Threatpost ".
GPlayed may be the new face of malware -- flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Adaptable, All-in-One Android Trojan Shows the Future of Malware
GPlayed may be the new face of malware β flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone.
π΄ Not All Multifactor Authentication Is Created Equal π΄
π Read
via "Dark Reading: ".
Users should be aware of the strengths and weaknesses of the various MFA methods.π Read
via "Dark Reading: ".
Darkreading
Not All Multifactor Authentication Is Created Equal
Users should be aware of the strengths and weaknesses of the various MFA methods.
π΄ Google Adds New Identity, Security Tools to Cloud Platform π΄
π Read
via "Dark Reading: ".
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.π Read
via "Dark Reading: ".
Dark Reading
Google Adds New Identity, Security Tools to Cloud Platform
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.
β ThreatList: Credential Theft Spikes by Triple Digits in U.S. β
π Read
via "The first stop for security news | Threatpost ".
Meanwhile, the LokiPWS (a.k.a. Lokibot) malware family distribution is surging.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Credential Theft Spikes by Triple Digits in U.S.
Meanwhile, the LokiPWS (a.k.a. Lokibot) malware family distribution is surging.
β New Drupalgeddon Attacks Enlist Shellbot to Open Backdoors β
π Read
via "The first stop for security news | Threatpost ".
Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.π Read
via "The first stop for security news | Threatpost ".
Threat Post
New Drupalgeddon Attacks Enlist Shellbot to Open Backdoors
Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.
β FitMetrix Exposes Millions of Customer Details, Accessed by Criminals β
π Read
via "The first stop for security news | Threatpost ".
Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.π Read
via "The first stop for security news | Threatpost ".
Threat Post
FitMetrix Exposes Millions of Customer Details, Accessed by Criminals
Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.
π΄ Most Malware Arrives Via Email π΄
π Read
via "Dark Reading: ".
Watch out for messages with the word "invoice" in the subject line, too.π Read
via "Dark Reading: ".
Dark Reading
Most Malware Arrives Via Email
Watch out for messages with the word invoice in the subject line, too.
π΄ Window Snyder Shares Her Plans for Intel Security π΄
π Read
via "Dark Reading: ".
The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π΄ Chinese Intelligence Officer Under Arrest for Trade Secret Theft π΄
π Read
via "Dark Reading: ".
Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.π Read
via "Dark Reading: ".
Darkreading
Chinese Intelligence Officer Under Arrest for Trade Secret Theft
Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.
π΄ Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up π΄
π Read
via "Dark Reading: ".
Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.π Read
via "Dark Reading: ".
Darkreading
Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up
Many organizations have yet to create an effective cybersecurity strategy β and it's costing them millions.
ATENTIONβΌ New - CVE-2017-1231
π Read
via "National Vulnerability Database".
IBM BigFix Platform 9.5 - 9.5.9 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 123910.π Read
via "National Vulnerability Database".
β Payment skimmers sneaking on to websites via third party code β
π Read
via "Naked Security".
Whatever Magecart is, itβs been blamed for several high-profile payment card breaches this summer.π Read
via "Naked Security".
Naked Security
Payment skimmers sneaking on to websites via third party code
Whatever Magecart is, itβs been blamed for several high-profile payment card breaches this summer.
β Experian credit-freeze PINs could be revealed by a simple trick β
π Read
via "Naked Security".
The credit bureaus' struggles with PINs continue...π Read
via "Naked Security".
Naked Security
Experian credit-freeze PINs could be revealed by a simple trick
The credit bureausβ struggles with PINs continueβ¦
π΄ 12 Free, Ready-to-Use Security Tools π΄
π Read
via "Dark Reading: ".
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.π Read
via "Dark Reading: ".
Dark Reading
12 Free, Ready-to-Use Security Tools
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
β 35 state attorney generals tell FCC to pull the plug on robocalls β
π Read
via "Naked Security".
The AGs want the FCC to adopt SHAKEN and STIR.π Read
via "Naked Security".
Naked Security
35 state attorneys general tell FCC to pull the plug on robocalls
The AGs want the FCC to adopt SHAKEN and STIR.