β 35 state attorney generals tell FCC to pull the plug on robocalls β
π Read
via "Naked Security".
The AGs want the FCC to adopt SHAKEN and STIR.π Read
via "Naked Security".
Naked Security
35 state attorneys general tell FCC to pull the plug on robocalls
The AGs want the FCC to adopt SHAKEN and STIR.
β What Kanye West can teach us about passcodes β
π Read
via "Naked Security".
Pulling out an iPhone XS to show the assembled throng a picture of the hydrogen-powered aircraft that βour president should be flying in,β West casually unlocked it using the passcode β000000β.π Read
via "Naked Security".
Naked Security
What Kanye West can teach us about passcodes
Pulling out an iPhone XS to show the assembled throng a picture of the hydrogen-powered aircraft that βour president should be flying in,β West casually unlocked it using the passcode β000000β.β¦
π΄ 12 Free, Ready-to-Use Security Tools π΄
π Read
via "Dark Reading: ".
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.π Read
via "Dark Reading: ".
Dark Reading
12 Free, Ready-to-Use Security Tools
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
β Facebook Bans More Than 800 Accounts in Disinformation Purge β
π Read
via "The first stop for security news | Threatpost ".
The move comes a month before the November midterm elections β and at a time when all eyes are on Facebook to see how it protects against disinformation.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Facebook Bans More Than 800 Accounts in Disinformation Purge
The move comes a month before the November midterm elections β and at a time when all eyes are on Facebook to see how it protects against disinformation.
π΄ Threat Hunters & Security Analysts: A Dynamic Duo π΄
π Read
via "Dark Reading: ".
Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.π Read
via "Dark Reading: ".
Darkreading
Threat Hunters & Security Analysts: A Dynamic Duo
Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.
π Almost half of cyberattacks are directed at SMBs, here's how to stay safe π
π Read
via "Security on TechRepublic".
In 2017, small businesses were impacted by 113,000 incidents of macro malware, according to a SCORE study.π Read
via "Security on TechRepublic".
TechRepublic
Almost half of cyberattacks are directed at SMBs, here's how to stay safe
In 2017, small businesses were impacted by 113,000 incidents of macro malware, according to a SCORE study.
β Shining a Light on a New Technique for Stealth Persistence β
π Read
via "The first stop for security news | Threatpost ".
Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Shining a Light on a New Technique for Stealth Persistence
Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence.
β Microsoft Zero-Day Patch for JET Bug Incomplete, Claims Firm β
π Read
via "The first stop for security news | Threatpost ".
The official update from Microsoft only limits the vulnerability, according to 0Patch.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Microsoft Zero-Day Patch for JET Bug Incomplete, Claims Firm
The official update from Microsoft only limits the vulnerability, according to 0Patch.
π Why cybersecurity is the fastest-growing insurance market for SMBs π
π Read
via "Security on TechRepublic".
Some 90% of SMBs are purchasing cyber insurance with limits of $1-$5 million, according to data from CyberPolicy.π Read
via "Security on TechRepublic".
TechRepublic
Why cybersecurity is the fastest-growing insurance market for SMBs
Some 90% of SMBs are purchasing cyber insurance with limits of $1-$5 million, according to data from CyberPolicy.
β Threatpost News Wrap Podcast For Oct. 12 β
π Read
via "The first stop for security news | Threatpost ".
Threatpost's editors discuss the top news of this week.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Threatpost News Wrap Podcast For Oct. 12
Threatpostβs editors discuss the top news of this week.
β ICS Security Plagued with Basic, Avoidable Mistakes β
π Read
via "The first stop for security news | Threatpost ".
A survey of ICS security posture found outdated firewalls, improper segmentation password mistakes and more.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ICS Security Plagued with Basic, Avoidable Mistakes
A survey of ICS security posture found outdated firewalls, improper segmentation password mistakes and more.
π΄ Facebook Update: 30 Million Users Actually Hit in its Recent Breach π΄
π Read
via "Dark Reading: ".
The good news: That number is less than the original estimate of 50 million. The bad news: It might not have been the only attack.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
π΄ Most IT Security Pros Want to Change Jobs π΄
π Read
via "Dark Reading: ".
They cite five main reasons for wanting to move on - and what it would take to retain them.π Read
via "Dark Reading: ".
Dark Reading
Most IT Security Pros Want to Change Jobs
They cite five main reasons for wanting to move on - and what it would take to retain them.
π Why manufacturing companies need to up their cybersecurity game π
π Read
via "Security on TechRepublic".
Cybercriminals now consider manufacturing companies a target-rich environment. Learn why and what can be done to get off that list.π Read
via "Security on TechRepublic".
TechRepublic
Why manufacturing companies need to up their cybersecurity game
Cybercriminals now consider manufacturing companies a target-rich environment. Learn why and what can be done to get off that list.
π How a tax credit can help small businesses in Maryland get cybersecure π
π Read
via "Security on TechRepublic".
Learn why Maryland's Cybersecurity Incentive Tax Credit for small businesses is a win-win situation.π Read
via "Security on TechRepublic".
TechRepublic
How a tax credit can help small businesses in Maryland get cybersecure
Learn why Maryland's Cybersecurity Incentive Tax Credit for small businesses is a win-win situation.
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From the Whatsapp hack to the world's most expensive USB stick, and everything in between. Catch up with everything we've written in the last 7 days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From the WhatsApp hack to the worldβs most expensive USB stick, and everything in between. Catch up with everything weβve written in the last 7 days β itβs weekly roundup tiβ¦
β Literary-minded phishers are trying to pilfer publishersβ manuscripts β
π Read
via "Naked Security".
In a twist on Business Email Compromise, they're spoofing literary agents and going after manuscripts at Penguin Random House and Pan Macmillan.π Read
via "Naked Security".
Naked Security
Literary-minded phishers are trying to pilfer publishersβ manuscripts
In a twist on Business Email Compromise, theyβre spoofing literary agents and going after manuscripts at Penguin Random House and Pan Macmillan.
β Beware sextortionists spoofing your own email address β
π Read
via "Naked Security".
In the past, they've pretended to have your passwords - now they're pretending to send email from your "hacked" account, too.π Read
via "Naked Security".
Naked Security
Beware sextortionists spoofing your own email address
In the past, theyβve pretended to have your passwords β now theyβre pretending to send email from your βhackedβ account, too.
β Facebook opens up about data breach details β
π Read
via "Naked Security".
Two weeks after Facebook's first serious data breach, and the social network has shared what it has figured out so far.π Read
via "Naked Security".
Naked Security
Facebook opens up about data breach details
Two weeks after Facebookβs first serious data breach, and the social network has shared what it has figured out so far.
π IBM takes cybersecurity on the road with rolling command center for training, response π
π Read
via "Security on TechRepublic".
The IBM X-Force C-TOC is a fully-operational Security Operations Center being driven around on a semi truck to provide education and support to professionals and consumers.π Read
via "Security on TechRepublic".
TechRepublic
IBM takes cybersecurity on the road with rolling command center for training, response
The IBM X-Force C-TOC is a fully-operational Security Operations Center being driven around on a semi truck to provide education and support to professionals and consumers.
π΄ 4 Ways to Fight the Email Security Threat π΄
π Read
via "Dark Reading: ".
It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.π Read
via "Dark Reading: ".
Darkreading
4 Ways to Fight the Email Security Threat
It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.