ATENTIONβΌ New - CVE-2014-10396
π Read
via "National Vulnerability Database".
The epic theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to includes/download.php.π Read
via "National Vulnerability Database".
π΄ 7 Ways VPNs Can Turn from Ally to Threat π΄
π Read
via "Dark Reading: ".
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.π Read
via "Dark Reading: ".
Dark Reading
7 Ways VPNs Can Turn from Ally to Threat
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.
β Monday review β the hot 22 stories of the week β
π Read
via "Naked Security".
From the Simjacker phone hack to IBM's cloud-based quantum computer - and everything in between. It's the weekly security roundup.π Read
via "Naked Security".
Naked Security
Monday review β the hot 22 stories of the week
From the Simjacker phone hack to IBMβs cloud-based quantum computer β and everything in between. Itβs the weekly security roundup.
β WannaCry β and why it never went away β
π Read
via "Naked Security".
WannaCry still hasn't died out, more than two years after the original attack. We went live to find out why...π Read
via "Naked Security".
Naked Security
WannaCry β and why it never went away
WannaCry still hasnβt died out, more than two years after the original attack. We went live to find out whyβ¦
β Two charged with tech-support scamming the elderly for $10m β
π Read
via "Naked Security".
The tech-support scammers were allegedly part of a network of crooks in the US and India who conned about 7,500 victims.π Read
via "Naked Security".
Naked Security
Two charged with tech-support scamming the elderly for $10m
The tech-support scammers were allegedly part of a network of crooks in the US and India who conned about 7,500 victims.
β Could EarEcho change the way we authenticate our phones? β
π Read
via "Naked Security".
Researchers have discovered a way to use wireless earbuds as a biometric authentication system.π Read
via "Naked Security".
Naked Security
Could EarEcho change the way we authenticate our phones?
Researchers have discovered a way to use wireless earbuds as a biometric authentication system.
β Google pulls more fake adblockers from Chrome Web Store β
π Read
via "Naked Security".
Google has again been reprimanded for not spotting fake extensions impersonating popular brands in its Chrome Web Store.π Read
via "Naked Security".
Naked Security
Google pulls more fake adblockers from Chrome Web Store
Google has again been reprimanded for not spotting fake extensions impersonating popular brands in its Chrome Web Store.
π΄ 'Playing Around' Can Teach Serious Security Lessons π΄
π Read
via "Dark Reading: ".
A project intended to move a small robot around a hazardous board teaches some solid security lessons.π Read
via "Dark Reading: ".
Dark Reading
'Playing Around' Can Teach Serious Security Lessons
A project intended to move a small robot around a hazardous board teaches some solid security lessons.
β Investors accuse FedEx of lying, stock dumping after NotPetya attack β
π Read
via "Naked Security".
This is the second such suit, with shareholders asking why execs sold $40m+ of their shares while downplaying the ransomware attack.π Read
via "Naked Security".
Naked Security
Investors accuse FedEx of lying, stock dumping after NotPetya attack
This is the second such suit, with shareholders asking why execs sold $40m+ of their shares while downplaying the ransomware attack.
β 200K Sign Petition Against Equifax Data Breach Settlement β
π Read
via "Threatpost".
A Change.org petition is demanding stronger accountability for Equifax in the 2017 leak that affected 150 million customers.π Read
via "Threatpost".
Threat Post
200K Sign Petition Against Equifax Data Breach Settlement
A Change.org petition is demanding stronger accountability for Equifax in the 2017 leak that affected 150 million customers.
π΄ How Network Logging Mitigates Legal Risk π΄
π Read
via "Dark Reading: ".
Logging that is turned on, captured, and preserved immediately after a cyber event is proof positive that personal data didn't fall into the hands of a cybercriminal.π Read
via "Dark Reading: ".
Dark Reading
How Network Logging Mitigates Legal Risk
Logging that is turned on, captured, and preserved immediately after a cyber event is proof positive that personal data didn't fall into the hands of a cybercriminal.
π How to use the new Firefox Private Network π
π Read
via "Security on TechRepublic".
Need to hide your location and encrypt your Firefox browser data? Look no further than the new Firefox Private Network add-on.π Read
via "Security on TechRepublic".
TechRepublic
How to use the new Firefox Private Network
Need to hide your location and encrypt your Firefox browser data? Look no further than the new Firefox Private Network add-on.
β Google Assistant Audio Privacy Controls Updated After Outcry β
π Read
via "Threatpost".
Google is tightening its privacy controls over its Google Assistant voice assistant after a report earlier this year found that it was eavesdropping on user conversations.π Read
via "Threatpost".
Threat Post
Google Assistant Audio Privacy Controls Updated After Outcry
Google is tightening its privacy controls over its Google Assistant voice assistant after a report earlier this year found that it was eavesdropping on user conversations.
π΄ 'Playing Around' with Code Keeps Security, DevOps Skills Sharp π΄
π Read
via "Dark Reading: ".
A project intended to move a small robot around a hazardous board teaches some solid security lessons.π Read
via "Dark Reading: ".
Dark Reading
'Playing Around' with Code Keeps Security, DevOps Skills Sharp
A project intended to move a small robot around a hazardous board teaches some solid security lessons.
π΄ YouTube Creators Hit in Account Hijacking Campaign π΄
π Read
via "Dark Reading: ".
The victims, who post car reviews and other videos about the auto industry, were targeted in a seemingly coordinated campaign to steal account access.π Read
via "Dark Reading: ".
Darkreading
YouTube Creators Hit in Account Hijacking Campaign
The victims, who post car reviews and other videos about the auto industry, were targeted in a seemingly coordinated campaign to steal account access.
π 46 Million Person Airline Breach Caused by Ex-Contractors π
π Read
via "Subscriber Blog RSS Feed ".
It appears this summer's 46-million-person breach at a Southeast Asian airline carrier wasnβt caused by a misconfigured bucket but by two ex-staffers at a contracting firm.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
46 Million Person Airline Breach Caused by Ex-Contractors
It appears this summer's 46-million-person breach at a Southeast Asian airline carrier wasnβt caused by a misconfigured bucket but by two ex-staffers at a contracting firm.
π΄ How Can I Ensure Cyber Insurers Will Pay My Claim? π΄
π Read
via "Dark Reading: ".
To get the best out of your policy, do more than just sign on the dotted line.π Read
via "Dark Reading: ".
Dark Reading
How Can I Ensure Cyber Insurers Will Pay My Claim?
To get the best out of your policy, do more than just sign on the dotted line.
π How to enable a randomized MAC address in Android 10 π
π Read
via "Security on TechRepublic".
Don't let your Android's MAC address give away your location--use a Randomized MAC address instead.π Read
via "Security on TechRepublic".
TechRepublic
How to enable a randomized MAC address in Android 10
Don't let your Android's MAC address give away your location--use a Randomized MAC address instead.
π΄ Microsoft Issues Out-of-Band Patch for Internet Explorer π΄
π Read
via "Dark Reading: ".
The security update fixes a vulnerability that could allow an attacker to remotely execute code at the same privilege as the legitimate user.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β More U.S. Utility Firms Targeted in Evolving LookBack Spearphishing Campaign β
π Read
via "Threatpost".
A spearphishing campaign first uncovered in July is hitting more utilities firms and spreading the LookBack malware, which has capabilities to view system data and reboot machines.π Read
via "Threatpost".
Threat Post
More U.S. Utility Firms Targeted in Evolving LookBack Spearphishing Campaign
A spearphishing campaign first uncovered in July is hitting more utilities firms and spreading the LookBack malware, which has capabilities to view system data and reboot machines.