π How data breaches are hurting small businesses π
π Read
via "Security on TechRepublic".
Some 30% of consumers surveyed said they would never again use a small business that suffered a data breach, according to a new report from Bank of America.π Read
via "Security on TechRepublic".
TechRepublic
How data breaches are hurting small businesses
Some 30% of consumers surveyed said they would never again use a small business that suffered a data breach, according to a new report from Bank of America Merchant Services.
β S2 Ep8: Facebook leak, $5m ransoms, DNS controversy β Naked Security Podcast β
π Read
via "Naked Security".
The latest Naked Security Podcast is live - listen now!π Read
via "Naked Security".
Naked Security
S2 Ep8: Facebook leak, $5m ransoms, DNS angst β Naked Security Podcast
The latest Naked Security Podcast is live β listen now!
π΄ The Fight Against Synthetic Identity Fraud π΄
π Read
via "Dark Reading: ".
Advanced data and innovative technology will help organizations more easily identify abnormal behavior and tell legitimate customers apart from "fake" ones.π Read
via "Dark Reading: ".
Dark Reading
The Fight Against Synthetic Identity Fraud
Advanced data and innovative technology will help organizations more easily identify abnormal behavior and tell legitimate customers apart from fake ones.
β 1B Mobile Users Vulnerable to Ongoing βSimJackerβ Surveillance Attack β
π Read
via "Threatpost".
More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn.π Read
via "Threatpost".
Threat Post
1B Mobile Users Vulnerable to Ongoing βSimJackerβ Surveillance Attack
More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn.
β California Passes Bill to Ban Police Use of Facial Recognition β
π Read
via "Threatpost".
The historic measure, which still needs to be signed into law, would prohibit biometric surveillance, including in bodycams.π Read
via "Threatpost".
Threat Post
California Passes Bill to Ban Police Use of Facial Recognition
The historic measure, which still needs to be signed into law, would prohibit biometric surveillance, including in bodycams.
π΄ APIs Get Their Own Top 10 Security List π΄
π Read
via "Dark Reading: ".
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.π Read
via "Dark Reading: ".
Dark Reading
APIs Get Their Own Top 10 Security List
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.
β Library-Themed University Phishing Attack Expands to Massive Scale β
π Read
via "Threatpost".
Cobalt Dickens (a.k.a. Silent Librarian) is now actively targeting 380 universities, bent on stealing credentials and moving deeper into school networks.π Read
via "Threatpost".
Threat Post
Library-Themed University Phishing Attack Expands to Massive Scale
Cobalt Dickens (a.k.a. Silent Librarian) is now actively targeting 380 universities, bent on stealing credentials and moving deeper into school networks.
π Wireshark Analyzer 3.0.4 π
π Go!
via "Security Tool Files β Packet Storm".
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Wireshark Analyzer 3.0.4 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π JPMorgan's Athena has 35 million lines of Python code, and won't be updated to Python 3 in time π
π Read
via "Security on TechRepublic".
With 35 million lines of Python code, the Athena trading platform is at the core of JPMorgan's business operations. A late start to migrating to Python 3 could create a security risk.π Read
via "Security on TechRepublic".
TechRepublic
JPMorganβs Athena has 35 million lines of Python code, and wonβt be updated to Python 3 in time
With 35 million lines of Python code, the Athena trading platform is at the core of JPMorgan's business operations. A late start to migrating to Python 3 could create a security risk.
π Education, Awareness at the Center of U.S.' First Insider Threat Month π
π Read
via "Subscriber Blog RSS Feed ".
Federal agencies are spreading awareness around the threats insiders can pose to both governments and companies this month.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Education, Awareness at the Center of U.S.' First Insider Threat Month
Federal agencies are spreading awareness around the threats insiders can pose to both governments and companies this month.
π΄ NetCAT Vulnerability Is Out of the Bag π΄
π Read
via "Dark Reading: ".
Researchers discover a side-channel vulnerability that exploits the network performance-enhancing capabilities of recent Intel server CPUs.π Read
via "Dark Reading: ".
Darkreading
NetCAT Vulnerability Is Out of the Bag
Researchers discover a side-channel vulnerability that exploits the network performance-enhancing capabilities of recent Intel server CPUs.
π΄ A Definitive Guide to Crowdsourced Vulnerability Management π΄
π Read
via "Dark Reading: ".
Knowing about a bug and actually securing it are very different things. These six steps will get you from "oh, sh*t" to fixed.π Read
via "Dark Reading: ".
Dark Reading
A Definitive Guide to Crowdsourced Vulnerability Management
Knowing about a bug and actually securing it are very different things. These six steps will get you from oh, sh*t to fixed.
π΄ Security Leaders Share Tips for Boardroom Chats π΄
π Read
via "Dark Reading: ".
Cisco, Oracle, and LinkedIn security leaders share their challenges in communicating with business teams and advice for how CISOs can navigate the relationship.π Read
via "Dark Reading: ".
Dark Reading
Security Leaders Share Tips for Boardroom Chats
Cisco, Oracle, and LinkedIn security leaders share their challenges in communicating with business teams and advice for how CISOs can navigate the relationship.
π΄ North Korea Seen Using ELECTRICFISH, BADCALL Malware Variants π΄
π Read
via "Dark Reading: ".
The FBI and CISA issued an alert the same week researchers disclosed a new campaign launched by actors with North Korean ties.π Read
via "Dark Reading: ".
Darkreading
North Korea Seen Using ELECTRICFISH, BADCALL Malware Variants
The FBI and CISA issued an alert the same week researchers disclosed a new campaign launched by actors with North Korean ties.
π΄ Indictments Do Little to Stop Iranian Group from New Attacks on Universities π΄
π Read
via "Dark Reading: ".
Cobalt Dickens targeted more than 60 universities in the US and elsewhere this summer, according to a new report.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ Instagram Bug Put User Account Details, Phone Numbers at Risk π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Darkreading
Instagram Bug Put User Account Details, Phone Numbers at Risk
The vulnerability, now patched, is the latest in a series of bad news for Facebook.
π΄ Escaping Email: Unlocking Message Security for SMS, WhatsApp π΄
π Read
via "Dark Reading: ".
Messaging is growing in importance as dislike for email increases. That means knowing how to protect critical data in the messaging era is a must for IT security.π Read
via "Dark Reading: ".
Dark Reading
Escaping Email: Unlocking Message Security for SMS, WhatsApp
Messaging is growing in importance as dislike for email increases. That means knowing how to protect critical data in the messaging era is a must for IT security.
β Fin7 sysadmin pleads guilty to running IT for billion-dollar crime syndicate β
π Read
via "Naked Security".
Fedir Oleksiyovich Hladyr is the first member of the infamous cybercrime network to be found guilty of hacking-related crimes in a US court.π Read
via "Naked Security".
Naked Security
Fin7 sysadmin pleads guilty to running IT for billion-dollar crime syndicate
Fedir Oleksiyovich Hladyr is the first member of the infamous cybercrime network to be found guilty of hacking-related crimes in a US court.
β Mozilla Private Network VPN gives Firefox another privacy boost β
π Read
via "Naked Security".
Is this week's test pilot launch of Mozilla Private Network the moment browser VPNs finally become a must-have privacy feature?π Read
via "Naked Security".
Naked Security
Mozilla Private Network VPN gives Firefox another privacy boost
Is this weekβs test pilot launch of Mozilla Private Network the moment browser VPNs finally become a must-have privacy feature?
β Cybercriminals Adding Sophistication to BEC Threats β
π Read
via "Threatpost".
New tactics aimed at business executies and users are being used to reap greater reward from e-mail based fraud, which continues to rise, researchers said.π Read
via "Threatpost".
Threat Post
Cybercriminals Adding Sophistication to BEC Threats
New tactics aimed at business executives and users are being used to reap greater reward from e-mail based fraud, which continues to rise, researchers said.