π΄ Google Announces New, Expanded Bounty Programs π΄
π Read
via "Dark Reading: ".
The company is significantly expanding the bug-bounty program for Google Play and starting a program aimed at user data protection.π Read
via "Dark Reading: ".
Dark Reading
Google Announces New, Expanded Bounty Programs
The company is significantly expanding the bug-bounty program for Google Play and starting a program aimed at user data protection.
β Google Targets Data-Abusing Apps with Bug Bounty Launch β
π Read
via "Threatpost".
Google is looking to battle the malicious apps - and apps abusing user data - on Google Play by improving its bug-bounty program arsenal.π Read
via "Threatpost".
Threat Post
Google Targets Data-Abusing Apps with Bug Bounty Launch
Google is looking to battle the malicious apps - and apps abusing user data - on Google Play by improving its bug-bounty program arsenal.
π Biometric Privacy Legislation Catching On Across America π
π Read
via "Subscriber Blog RSS Feed ".
The past few years has seen several states in the U.S. adopt, or look to adopt biometric privacy legislation that dictates what type of facial, fingerprint, or retinal data organizations can collect, use, and store.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Biometric Privacy Legislation Catching On Across America
The past few years has seen several states in the U.S. adopt, or look to adopt biometric privacy legislation that dictates what type of facial, fingerprint, or retinal data organizations can collect, use, and store.
π How much do you know about the Russian Dark Web? π
π Read
via "Security on TechRepublic".
Security expert Charity Wright discusses the Dark Web in Russia, how the Dark Web is being used in Vietnam for anonymity from the government, China's surveillance efforts, and more.π Read
via "Security on TechRepublic".
TechRepublic
How much do you know about the Russian Dark Web?
Security expert Charity Wright discusses the Dark Web in Russia, how the Dark Web is being used in Vietnam for anonymity from the government, China's surveillance efforts, and more.
π΄ Retadup Worm Squashed After Infecting 850K Machines π΄
π Read
via "Dark Reading: ".
An operation involving French law enforcement, the FBI, and Avast forces Retadup to delete itself from victim machines.π Read
via "Dark Reading: ".
Darkreading
Retadup Worm Squashed After Infecting 850K Machines
An operation involving French law enforcement, the FBI, and Avast forces Retadup to delete itself from victim machines.
β FIN6 Switches Up PoS Tactics to Target E-Commerce β
π Read
via "Threatpost".
The group is using the More_eggs JScript backdoor to anchor its attack.π Read
via "Threatpost".
Threat Post
FIN6 Switches Up PoS Tactics to Target E-Commerce
The group is using the More_eggs JScript backdoor to anchor its attack.
β TGI Fridays Delivers Customer Indigestion Over Data Exposure β
π Read
via "Threatpost".
TGI Fridays Australia restaurant chain warns loyalty reward program member of exposed data incident.π Read
via "Threatpost".
Threat Post
TGI Fridays Delivers Customer Indigestion Over Data Exposure
TGI Fridays Australia restaurant chain warns loyalty reward program member of exposed data incident.
π Help! Our VMware Server is infected with ransomware π
π Read
via "Security on TechRepublic".
TechRepublic member sagilbert47201 has discovered their VMware backup server is infected with ransomware. Can you help this TechRepublic member recover their data?π Read
via "Security on TechRepublic".
TechRepublic
Help! Our VMware Server is infected with ransomware
TechRepublic member sagilbert47201 has discovered their VMware backup server is infected with ransomware. Can you help this TechRepublic member recover their data?
β Google warns of system-controlling Chrome bug β
π Read
via "Naked Security".
Google is patching a serious bug in the desktop version of its Chrome browser that could let an attacker take over a computer simply by luring them to a website.π Read
via "Naked Security".
Naked Security
Google warns of system-controlling Chrome bug
Google is patching a serious bug in the desktop version of its Chrome browser that could let an attacker take over a computer simply by luring them to a website.
β Apple apologizes for humans listening to Siri clips, changes policy β
π Read
via "Naked Security".
Apple is turning off automatic review of Siri audio and locking it down so that only Apple employees get to listen to it.π Read
via "Naked Security".
Naked Security
Apple apologizes for humans listening to Siri clips, changes policy
Apple is turning off automatic review of Siri audio and locking it down so that only Apple employees get to listen to it.
β Facebook: βTechnical errorβ let strangers into Messenger Kids chats β
π Read
via "Naked Security".
It won't happen again, Facebook told senators who wondered how well it's handling kids' privacy in the chat app abhorred by kids advocates.π Read
via "Naked Security".
Naked Security
Facebook: βTechnical errorβ let strangers into Messenger Kids chats
It wonβt happen again, Facebook told senators who wondered how well itβs handling kidsβ privacy in the chat app abhorred by kids advocates.
π Friday Five: 8/30 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Apple recommits to privacy with Siri, news on a bug bounty program for the DHS, plus the IRS warns of a new phishing attack - catch up on the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 8/30 Edition
Apple recommits to privacy with Siri, news on a bug bounty program for the DHS, plus the IRS warns of a new phishing attack - catch up on the week's news with the Friday Five.
β Botnet targets set-top boxes using Android OS β
π Read
via "Naked Security".
Production systems aren't supposed to have the ADB turned on, but some set-top boxes do.π Read
via "Naked Security".
Naked Security
Botnet targets set-top boxes using Android OS
Production systems arenβt supposed to have the ADB turned on, but some set-top boxes do.
π΄ 7 Breaches & Hacks That Throw Shade on Biometric Security π΄
π Read
via "Dark Reading: ".
Stolen fingerprints, fake hands, voice synthetization, and other nefarious techniques show biometrics has plenty of challenges.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
β News Wrap: Dentist Offices Hit By Ransomware, Venmo Faces Privacy Firestorm β
π Read
via "Threatpost".
From new ransomware attacks to privacy issues around Venmo and Ring, Threatpost editors break down the top news of this week.π Read
via "Threatpost".
Threat Post
News Wrap: Dentist Offices Hit By Ransomware, Venmo Faces Privacy Firestorm
From new ransomware attacks to privacy issues around Venmo and Ring, Threatpost editors break down the top news of this week.
π΄ To Navigate a Sea of Cybersecurity Solutions, Learn How to Fish π΄
π Read
via "Dark Reading: ".
Three steps for relieving the pressure of picking the right tools.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Sophisticated iPhone hacking went unnoticed for over two years β
π Read
via "Naked Security".
Compromised iPhones were turned into surveillance tools capable of recording the ownerβs entire digital life.π Read
via "Naked Security".
Naked Security
Sophisticated iPhone hacking went unnoticed for over two years
Compromised iPhones were turned into surveillance tools capable of recording the ownerβs entire digital life.
π΄ 'It Saved Our Community': 16 Realistic Ransomware Defenses for Cities π΄
π Read
via "Dark Reading: ".
Practical steps municipal governments can take to better prevent and respond to ransomware infections.π Read
via "Dark Reading: ".
Darkreading
'It Saved Our Community': 16 Realistic Ransomware Defenses for Cities
Practical steps municipal governments can take to better prevent and respond to ransomware infections.
π How the Cloud Security Alliance helps businesses identify and mitigate cybersecurity risks π
π Read
via "Security on TechRepublic".
John Yeoh explains how CSA works with organizations on various aspects of cloud security to identify top risks, assess cloud service providers, establish baseline controls, and build best practices.π Read
via "Security on TechRepublic".
TechRepublic
How the Cloud Security Alliance helps businesses identify and mitigate cybersecurity risks
John Yeoh explains how CSA works with organizations on various aspects of cloud security to identify top risks, assess cloud service providers, establish baseline controls, and build best practices.
π΄ Overburdened SOC Analysts Shift Priorities π΄
π Read
via "Dark Reading: ".
Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows.π Read
via "Dark Reading: ".
Dark Reading
Overburdened SOC Analysts Shift Priorities
Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows.
β Six Hackers Have Now Pocketed $1M From Bug Bounty Programs β
π Read
via "Threatpost".
Up to 25 percent of valid vulnerabilities found in bug bounty programs are classified as being of high or critical severity.π Read
via "Threatpost".
Threat Post
Six Hackers Have Now Pocketed $1M From Bug Bounty Programs
Up to 25 percent of valid vulnerabilities found in bug bounty programs are classified as being of high or critical severity.