π Australian not-for-profit's encryption solution to privacy breaches π
π Read
via "Security on TechRepublic".
An Australian open source foundation is introducing a new approach to encryption called splintering, TechRepublic's Karen Roby talks with the Tide Foundation's co-founder.π Read
via "Security on TechRepublic".
TechRepublic
Australian not-for-profit's encryption solution to privacy breaches
An Australian open source foundation is introducing a new approach to encryption called splintering, TechRepublic's Karen Roby talks with the Tide Foundation's co-founder.
π΄ Snowden Sued by US Government Over His New Book π΄
π Read
via "Dark Reading: ".
Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.π Read
via "Dark Reading: ".
Dark Reading
Snowden Sued by US Government Over His New Book
Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.
π Scientific Trade Secrets, Medical Research Focus of Latest IP Theft Case π
π Read
via "Subscriber Blog RSS Feed ".
Researchers at this children's hospital purportedly stole trade secrets, then used them to start and market their own Chinese biotechnology firm.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Scientific Trade Secrets, Medical Research Focus of Latest IP Theft Case
Researchers at this children's hospital purportedly stole trade secrets, then used them to start and market their own Chinese biotechnology firm.
π΄ Any Advice for Assessing Third-Party Risk? π΄
π Read
via "Dark Reading: ".
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.π Read
via "Dark Reading: ".
Dark Reading
Any Advice for Assessing Third-Party Risk?
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.
β Panda Threat Group Mines for Monero With Updated Payload, Targets β
π Read
via "Threatpost".
Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.π Read
via "Threatpost".
Threat Post
Panda Threat Group Mines for Monero With Updated Payload, Targets
Though harboring unsophisticated payloads, the Panda threat group has updated its tactics - from targets to infrastructure - and successfully mined hundreds of thousands of dollars using cryptomining malware.
π΄ MITRE Releases 2019 List of Top 25 Software Weaknesses π΄
π Read
via "Dark Reading: ".
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
MITRE Releases 2019 List of Top 25 Software Weaknesses
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
π΄ Poll Results: Maybe Not Burned Out, But Definitely 'Well-Done' π΄
π Read
via "Dark Reading: ".
Staff shortages and an increasingly challenging job is turning up the heat on security pros, Dark Reading readers say.π Read
via "Dark Reading: ".
Dark Reading
Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'
Staff shortages and increasingly challenging jobs are turning up the heat on security pros, readers say.
β Teenage gamer jailed over lethal swatting β
π Read
via "Naked Security".
Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.π Read
via "Naked Security".
Naked Security
Teenage gamer jailed over lethal swatting
Casey Viner got into a spat over a $1.50 wager in a Call of Duty World War II game that led to the fatal shooting of an innocent man.
β Common storage and router devices are still hopelessly broken β
π Read
via "Naked Security".
Donβt be lulled into a false sense of security by that shiny new router or network-attached storage (NAS) device - the chances are that itβs no more secure than its predecessors.π Read
via "Naked Security".
Naked Security
Common storage and router devices are still hopelessly broken
Donβt be lulled into a false sense of security by that shiny new router or network-attached storage (NAS) device β the chances are that itβs no more secure than its predecessors.
β Leaky database spills data on 20 million Ecuadorians and businesses β
π Read
via "Naked Security".
Included are deep details on 7 million minors, one grownup named Julian Assange, and perhaps a few million deceased Ecuadorians.π Read
via "Naked Security".
Naked Security
Leaky database spills data on 20 million Ecuadorians and businesses
Included are deep details on 7 million minors, one grownup named Julian Assange, and perhaps a few million deceased Ecuadorians.
β Is $100 million enough to save the web from ads? β
π Read
via "Naked Security".
Mozilla, Creative Commons and Coil are teaming up to launch a $100m fund to drive out advertising and advocate privacy across the web.π Read
via "Naked Security".
Naked Security
Is $100 million enough to save the web from ads?
Mozilla, Creative Commons and Coil are teaming up to launch a $100m fund to drive out advertising and advocate privacy across the web.
β WannaCry β the worm that just wonβt die β
π Read
via "Naked Security".
WannaCry never went away - it just became less obvious.π Read
via "Naked Security".
Naked Security
WannaCry β the worm that just wonβt die
WannaCry never went away β it just became less obvious.
β Malware Moves: The Rise of LookBack β And Return of Emotet β
π Read
via "Threatpost".
The malware landscape is constantly changing; including a rise in a new malware called LookBack, as well as anticipation over the return of the Emotet and Retefe malware families.π Read
via "Threatpost".
Threat Post
Malware Moves: The Rise of LookBack β And Return of Emotet
Researchers believe that nation-state actors are behind several spearphishing campaigns targeting U.S. utility companies with a newly-identified malware called LookBack, which has the capabilities to view system data and reboot machines. Meanwhile, otherβ¦
β Massive Gaming DDoS Exploits Widespread Technology β
π Read
via "Threatpost".
The attack -- the 4th-largest the company has ever encountered -- leveraged WS-Discovery, the same exploit used in the 2016 Dyn incident.π Read
via "Threatpost".
Threat Post
Massive Gaming DDoS Exploits Widespread Technology
The attack β the 4th-largest the company has ever encountered β leveraged WS-Discovery, which is found "everywhere."
π Exposed RDP servers see 150K brute-force attempts per week: Here's how to protect them π
π Read
via "Security on TechRepublic".
BlueKeep and DejaBlue renewed interest in brute-force scanning for vulnerable systems, which negatively impacts Windows Server performance. Cameyo offers solutions to protect your Virtual Desktop server.π Read
via "Security on TechRepublic".
TechRepublic
Exposed RDP servers see 150K brute-force attempts per week: Here's how to protect them
BlueKeep and DejaBlue renewed interest in brute-force scanning for vulnerable systems, which negatively impacts Windows Server performance. Cameyo has solutions to protect your Virtual Desktop server.
β New! RFP Template for Selecting EDR/EPP and APT Security β
π Read
via "Threatpost".
Cynetβs new RFP templates clearly lay out the requirements for securing potential APT vectors.π Read
via "Threatpost".
Threat Post
New! RFP Template for Selecting EDR/EPP and APT Security
Cynetβs new RFP templates clearly lay out the requirements for securing potential APT vectors.
π PwC: Boosting digital resilience is the new best defense against cyber attacks π
π Read
via "Security on TechRepublic".
Now that you've completed your digital transformation, you need to build a system to protect this new way of doing business.π Read
via "Security on TechRepublic".
TechRepublic
PwC: Boosting digital resilience is the best defense against cyber attacks
Now that you've completed your digital transformation, you need to build a system to protect this new way of doing business.