π΄ Impersonation Fraud Still Effective in Obtaining Code Signatures π΄
π Read
via "Dark Reading: ".
Fraudsters continue to attempt to fool certificate authorities into issuing valid digital certificates for legitimate organizations by impersonating an authoritative user. The reward? The ability to sign code with a legitimate signature.π Read
via "Dark Reading: ".
Darkreading
Impersonation Fraud Still Effective in Obtaining Code Signatures
Fraudsters continue to attempt to fool certificate authorities into issuing valid digital certificates for legitimate organizations by impersonating an authoritative user. The reward? The ability to sign code with a legitimate signature.
β Google Calendar Settings Gaffes Exposes Usersβ Meetings, Company Details β
π Read
via "Threatpost".
A configuration setting in Google Calendars does not sufficiently warn users that it makes their calendars public to all, a researcher argues.π Read
via "Threatpost".
Threat Post
Google Calendar Settings Gaffes Exposes Usersβ Meetings, Company Details
A configuration setting in Google Calendars does not sufficiently warn users that it makes their calendars public to all, a researcher argues.
β Cisco Extends Patch for IPv6 DoS Vulnerability β
π Read
via "Threatpost".
The bug was first found in 2016.π Read
via "Threatpost".
Threat Post
Cisco Extends Patch for IPv6 DoS Vulnerability
The bug was first found in 2016.
π΄ 15K Private Webcams Could Let Attackers View Homes, Businesses π΄
π Read
via "Dark Reading: ".
Webcams could be potentially accessed and manipulated by anyone with an Internet connection, researchers say.π Read
via "Dark Reading: ".
Dark Reading
15K Private Webcams Could Let Attackers View Homes, Businesses
Webcams could be potentially accessed and manipulated by anyone with an Internet connection, researchers say.
π How to avoid the dreaded Video4Linux flaw in Android π
π Read
via "Security on TechRepublic".
With Google dragging their feet on the fix for Video4Linux, you might consider revoking camera permissions for certain apps.π Read
via "Security on TechRepublic".
TechRepublic
How to avoid the dreaded Video4Linux flaw in Android
With Google dragging its feet on the fix for Video4Linux, you might consider revoking camera permissions for certain apps.
β AMD Radeon Graphics Cards Open VMware Workstations to Attack β
π Read
via "Threatpost".
Bug impacts VMware Workstation 15 running 64-bit versions of Windows 10 as the guest VM.π Read
via "Threatpost".
Threat Post
AMD Radeon Graphics Cards Open VMware Workstations to Attack
Bug impacts VMware Workstation 15 running 64-bit versions of Windows 10 as the guest VM.
π΄ Cybercriminal's Black Market Pricing Guide π΄
π Read
via "Dark Reading: ".
Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.π Read
via "Dark Reading: ".
Dark Reading
Cybercriminal's Black Market Pricing Guide
Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.
π How to protect yourself against web miners π
π Read
via "Security on TechRepublic".
While using your browser to mine cryptocurrencies for profit, web miners can chew up power from your computer, says a new report from Kaspersky.π Read
via "Security on TechRepublic".
TechRepublic
How to protect yourself against web miners
While using your browser to mine cryptocurrencies for profit, web miners can chew up power from your computer, says a new report from Kaspersky.
π DNS amplification attacks increase by 1,000% since 2018 π
π Read
via "Security on TechRepublic".
Researchers said a new defense system is fueling a wave of DNS amplification attacks.π Read
via "Security on TechRepublic".
TechRepublic
DNS amplification attacks increase by 1,000% since 2018
Researchers said a new defense system is fueling a wave of DNS amplification attacks.
π΄ Five Common Cloud Configuration Mistakes π΄
π Read
via "Dark Reading: ".
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.π Read
via "Dark Reading: ".
Dark Reading
Five Common Cloud Configuration Mistakes
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.
π Australian not-for-profit's encryption solution to privacy breaches π
π Read
via "Security on TechRepublic".
An Australian open source foundation is introducing a new approach to encryption called splintering, TechRepublic's Karen Roby talks with the Tide Foundation's co-founder.π Read
via "Security on TechRepublic".
TechRepublic
Australian not-for-profit's encryption solution to privacy breaches
An Australian open source foundation is introducing a new approach to encryption called splintering, TechRepublic's Karen Roby talks with the Tide Foundation's co-founder.
π΄ Snowden Sued by US Government Over His New Book π΄
π Read
via "Dark Reading: ".
Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.π Read
via "Dark Reading: ".
Dark Reading
Snowden Sued by US Government Over His New Book
Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.
π Scientific Trade Secrets, Medical Research Focus of Latest IP Theft Case π
π Read
via "Subscriber Blog RSS Feed ".
Researchers at this children's hospital purportedly stole trade secrets, then used them to start and market their own Chinese biotechnology firm.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Scientific Trade Secrets, Medical Research Focus of Latest IP Theft Case
Researchers at this children's hospital purportedly stole trade secrets, then used them to start and market their own Chinese biotechnology firm.
π΄ Any Advice for Assessing Third-Party Risk? π΄
π Read
via "Dark Reading: ".
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.π Read
via "Dark Reading: ".
Dark Reading
Any Advice for Assessing Third-Party Risk?
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.
β Panda Threat Group Mines for Monero With Updated Payload, Targets β
π Read
via "Threatpost".
Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.π Read
via "Threatpost".
Threat Post
Panda Threat Group Mines for Monero With Updated Payload, Targets
Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.
π΄ MITRE Releases 2019 List of Top 25 Software Weaknesses π΄
π Read
via "Dark Reading: ".
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
MITRE Releases 2019 List of Top 25 Software Weaknesses
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
π΄ Poll Results: Maybe Not Burned Out, But Definitely 'Well-Done' π΄
π Read
via "Dark Reading: ".
Staff shortages and an increasingly challenging job is turning up the heat on security pros, Dark Reading readers say.π Read
via "Dark Reading: ".
Dark Reading
Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'
Staff shortages and increasingly challenging jobs are turning up the heat on security pros, readers say.
β Teenage gamer jailed over lethal swatting β
π Read
via "Naked Security".
Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.π Read
via "Naked Security".
Naked Security
Teenage gamer jailed over lethal swatting
Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.