β Google experiments with DNS-over-HTTP in Chrome β
π Read
via "Naked Security".
Following hot on Mozilla's trail, Google officially announced its own DNS-over-HTTPS (DoH) experiment in Chrome this week.π Read
via "Naked Security".
Naked Security
Google experiments with DNS-over-HTTPS in Chrome
Following hot on Mozillaβs trail, Google officially announced its own DNS-over-HTTPS (DoH) experiment in Chrome this week.
β Massive email fraud bust snares 281 suspects β
π Read
via "Naked Security".
Operation reWired=tired cops worldwide! 167 suspects were cuffed in Nigeria and 74 in the US, among 8 other countries.π Read
via "Naked Security".
Naked Security
Massive email fraud bust snares 281 suspects
Operation reWired=tired cops worldwide! 167 suspects were cuffed in Nigeria and 74 in the US, among 8 other countries.
β September 2019βs Patch Tuesday: 2 zero-days, 17 critical bugs β
π Read
via "Naked Security".
Sometimes, a Patch Tuesday update arrives with a bang that sends users scrambling for cover - September's update earns that description.π Read
via "Naked Security".
Naked Security
September 2019βs Patch Tuesday: 2 zero-days, 17 critical bugs
Sometimes, a Patch Tuesday update arrives with a bang that sends users scrambling for cover β Septemberβs update earns that description.
β UNICEF Leaks Personal Data of 8,000 Users via Email Blunder β
π Read
via "Threatpost".
The organization accidentally sent the names, email addresses, gender and professional information of users of its portal Agora in an email sent in August.π Read
via "Threatpost".
Threat Post
UNICEF Leaks Personal Data of 8,000 Users via Email Blunder
The organization accidentally sent the names, email addresses, gender and professional information of users of its portal Agora in an email sent in August.
π΅ NordVPN to introduce NordVPN Teams β a new solution for businesses π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
NordVPN Teams: A New Business VPN Solution by NordVPN | VPNpro
NordVPN has just announced a new product β NordVPN Teams, a VPN solution for business. Find out how about its exciting features and how to get early access.
π΅ Face-off: why firms may want to hit pause on facial recognition tech π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
Face-off: Firms About to Pause Facial Recognition Technology? | VPNpro
Facial recognition technology is growing privacy and regulatory concerns, so it might be best for firms to evaluate this technology before investing in it.
π΅ Mozilla joins the ranks of VPN providers with Firefox Private Network π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
Free Beta Of Mozilla's VPN Service β Firefox Private Network | VPNpro
Mozilla offers free beta of its latest privacy tool β Firefox Private Network. Will this be a full-fledged VPN or merely a browser extension? Find out more.
π How data breaches are hurting small businesses π
π Read
via "Security on TechRepublic".
Some 30% of consumers surveyed said they would never again use a small business that suffered a data breach, according to a new report from Bank of America.π Read
via "Security on TechRepublic".
TechRepublic
How data breaches are hurting small businesses
Some 30% of consumers surveyed said they would never again use a small business that suffered a data breach, according to a new report from Bank of America Merchant Services.
β S2 Ep8: Facebook leak, $5m ransoms, DNS controversy β Naked Security Podcast β
π Read
via "Naked Security".
The latest Naked Security Podcast is live - listen now!π Read
via "Naked Security".
Naked Security
S2 Ep8: Facebook leak, $5m ransoms, DNS angst β Naked Security Podcast
The latest Naked Security Podcast is live β listen now!
π΄ The Fight Against Synthetic Identity Fraud π΄
π Read
via "Dark Reading: ".
Advanced data and innovative technology will help organizations more easily identify abnormal behavior and tell legitimate customers apart from "fake" ones.π Read
via "Dark Reading: ".
Dark Reading
The Fight Against Synthetic Identity Fraud
Advanced data and innovative technology will help organizations more easily identify abnormal behavior and tell legitimate customers apart from fake ones.
β 1B Mobile Users Vulnerable to Ongoing βSimJackerβ Surveillance Attack β
π Read
via "Threatpost".
More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn.π Read
via "Threatpost".
Threat Post
1B Mobile Users Vulnerable to Ongoing βSimJackerβ Surveillance Attack
More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn.
β California Passes Bill to Ban Police Use of Facial Recognition β
π Read
via "Threatpost".
The historic measure, which still needs to be signed into law, would prohibit biometric surveillance, including in bodycams.π Read
via "Threatpost".
Threat Post
California Passes Bill to Ban Police Use of Facial Recognition
The historic measure, which still needs to be signed into law, would prohibit biometric surveillance, including in bodycams.
π΄ APIs Get Their Own Top 10 Security List π΄
π Read
via "Dark Reading: ".
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.π Read
via "Dark Reading: ".
Dark Reading
APIs Get Their Own Top 10 Security List
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.
β Library-Themed University Phishing Attack Expands to Massive Scale β
π Read
via "Threatpost".
Cobalt Dickens (a.k.a. Silent Librarian) is now actively targeting 380 universities, bent on stealing credentials and moving deeper into school networks.π Read
via "Threatpost".
Threat Post
Library-Themed University Phishing Attack Expands to Massive Scale
Cobalt Dickens (a.k.a. Silent Librarian) is now actively targeting 380 universities, bent on stealing credentials and moving deeper into school networks.
π Wireshark Analyzer 3.0.4 π
π Go!
via "Security Tool Files β Packet Storm".
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Wireshark Analyzer 3.0.4 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π JPMorgan's Athena has 35 million lines of Python code, and won't be updated to Python 3 in time π
π Read
via "Security on TechRepublic".
With 35 million lines of Python code, the Athena trading platform is at the core of JPMorgan's business operations. A late start to migrating to Python 3 could create a security risk.π Read
via "Security on TechRepublic".
TechRepublic
JPMorganβs Athena has 35 million lines of Python code, and wonβt be updated to Python 3 in time
With 35 million lines of Python code, the Athena trading platform is at the core of JPMorgan's business operations. A late start to migrating to Python 3 could create a security risk.
π Education, Awareness at the Center of U.S.' First Insider Threat Month π
π Read
via "Subscriber Blog RSS Feed ".
Federal agencies are spreading awareness around the threats insiders can pose to both governments and companies this month.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Education, Awareness at the Center of U.S.' First Insider Threat Month
Federal agencies are spreading awareness around the threats insiders can pose to both governments and companies this month.