π Ohio taps college cybersecurity experts to audit election systems before 2018 midterms π
π Read
via "Security on TechRepublic".
Called 'Pathfinders,' these security officials are conducting risk assessments and mitigating vulnerabilities in voting systems.π Read
via "Security on TechRepublic".
TechRepublic
Ohio taps college cybersecurity experts to audit election systems before 2018 midterms
Called 'Pathfinders,' these security officials are conducting risk assessments and mitigating vulnerabilities in voting systems.
π΄ One-Third of US Adults Hit with Identity Theft π΄
π Read
via "Dark Reading: ".
That's double the global average and more than three times the rate of French and German adults.π Read
via "Dark Reading: ".
Dark Reading
One-Third of US Adults Hit with Identity Theft
That's double the global average and more than three times the rate of French and German adults.
β Adaptable, All-in-One Android Trojan Shows the Future of Malware β
π Read
via "The first stop for security news | Threatpost ".
GPlayed may be the new face of malware -- flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Adaptable, All-in-One Android Trojan Shows the Future of Malware
GPlayed may be the new face of malware β flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone.
π΄ Not All Multifactor Authentication Is Created Equal π΄
π Read
via "Dark Reading: ".
Users should be aware of the strengths and weaknesses of the various MFA methods.π Read
via "Dark Reading: ".
Darkreading
Not All Multifactor Authentication Is Created Equal
Users should be aware of the strengths and weaknesses of the various MFA methods.
π΄ Google Adds New Identity, Security Tools to Cloud Platform π΄
π Read
via "Dark Reading: ".
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.π Read
via "Dark Reading: ".
Dark Reading
Google Adds New Identity, Security Tools to Cloud Platform
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.
β ThreatList: Credential Theft Spikes by Triple Digits in U.S. β
π Read
via "The first stop for security news | Threatpost ".
Meanwhile, the LokiPWS (a.k.a. Lokibot) malware family distribution is surging.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Credential Theft Spikes by Triple Digits in U.S.
Meanwhile, the LokiPWS (a.k.a. Lokibot) malware family distribution is surging.
β New Drupalgeddon Attacks Enlist Shellbot to Open Backdoors β
π Read
via "The first stop for security news | Threatpost ".
Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.π Read
via "The first stop for security news | Threatpost ".
Threat Post
New Drupalgeddon Attacks Enlist Shellbot to Open Backdoors
Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.
β FitMetrix Exposes Millions of Customer Details, Accessed by Criminals β
π Read
via "The first stop for security news | Threatpost ".
Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.π Read
via "The first stop for security news | Threatpost ".
Threat Post
FitMetrix Exposes Millions of Customer Details, Accessed by Criminals
Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.
π΄ Most Malware Arrives Via Email π΄
π Read
via "Dark Reading: ".
Watch out for messages with the word "invoice" in the subject line, too.π Read
via "Dark Reading: ".
Dark Reading
Most Malware Arrives Via Email
Watch out for messages with the word invoice in the subject line, too.
π΄ Window Snyder Shares Her Plans for Intel Security π΄
π Read
via "Dark Reading: ".
The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π΄ Chinese Intelligence Officer Under Arrest for Trade Secret Theft π΄
π Read
via "Dark Reading: ".
Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.π Read
via "Dark Reading: ".
Darkreading
Chinese Intelligence Officer Under Arrest for Trade Secret Theft
Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.
π΄ Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up π΄
π Read
via "Dark Reading: ".
Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.π Read
via "Dark Reading: ".
Darkreading
Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up
Many organizations have yet to create an effective cybersecurity strategy β and it's costing them millions.
ATENTIONβΌ New - CVE-2017-1231
π Read
via "National Vulnerability Database".
IBM BigFix Platform 9.5 - 9.5.9 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 123910.π Read
via "National Vulnerability Database".
β Payment skimmers sneaking on to websites via third party code β
π Read
via "Naked Security".
Whatever Magecart is, itβs been blamed for several high-profile payment card breaches this summer.π Read
via "Naked Security".
Naked Security
Payment skimmers sneaking on to websites via third party code
Whatever Magecart is, itβs been blamed for several high-profile payment card breaches this summer.
β Experian credit-freeze PINs could be revealed by a simple trick β
π Read
via "Naked Security".
The credit bureaus' struggles with PINs continue...π Read
via "Naked Security".
Naked Security
Experian credit-freeze PINs could be revealed by a simple trick
The credit bureausβ struggles with PINs continueβ¦
π΄ 12 Free, Ready-to-Use Security Tools π΄
π Read
via "Dark Reading: ".
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.π Read
via "Dark Reading: ".
Dark Reading
12 Free, Ready-to-Use Security Tools
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
β 35 state attorney generals tell FCC to pull the plug on robocalls β
π Read
via "Naked Security".
The AGs want the FCC to adopt SHAKEN and STIR.π Read
via "Naked Security".
Naked Security
35 state attorneys general tell FCC to pull the plug on robocalls
The AGs want the FCC to adopt SHAKEN and STIR.
β What Kanye West can teach us about passcodes β
π Read
via "Naked Security".
Pulling out an iPhone XS to show the assembled throng a picture of the hydrogen-powered aircraft that βour president should be flying in,β West casually unlocked it using the passcode β000000β.π Read
via "Naked Security".
Naked Security
What Kanye West can teach us about passcodes
Pulling out an iPhone XS to show the assembled throng a picture of the hydrogen-powered aircraft that βour president should be flying in,β West casually unlocked it using the passcode β000000β.β¦
π΄ 12 Free, Ready-to-Use Security Tools π΄
π Read
via "Dark Reading: ".
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.π Read
via "Dark Reading: ".
Dark Reading
12 Free, Ready-to-Use Security Tools
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
β Facebook Bans More Than 800 Accounts in Disinformation Purge β
π Read
via "The first stop for security news | Threatpost ".
The move comes a month before the November midterm elections β and at a time when all eyes are on Facebook to see how it protects against disinformation.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Facebook Bans More Than 800 Accounts in Disinformation Purge
The move comes a month before the November midterm elections β and at a time when all eyes are on Facebook to see how it protects against disinformation.
π΄ Threat Hunters & Security Analysts: A Dynamic Duo π΄
π Read
via "Dark Reading: ".
Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.π Read
via "Dark Reading: ".
Darkreading
Threat Hunters & Security Analysts: A Dynamic Duo
Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.