β Privacy Regulation Could Be a Test for Statesβ Rights β
π Read
via "The first stop for security news | Threatpost ".
As more states take cybersecurity and privacy issues into their own hands, experts worry that big tech will push for preemption.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Privacy Regulation Could Be a Test for Statesβ Rights
As more states take cybersecurity and privacy issues into their own hands, experts worry that big tech will push for preemption.
π΄ 6 Reasons Why Employees Violate Security Policies π΄
π Read
via "Dark Reading: ".
Get into their heads to find out why they're flouting your corporate cybersecurity rules.π Read
via "Dark Reading: ".
Dark Reading
6 Reasons Why Employees Violate Security Policies
Get into their heads to find out why they're flouting your corporate cybersecurity rules.
β Facebook Expands Efforts to Squash Voter Suppression β
π Read
via "The first stop for security news | Threatpost ".
The social network will crack down on those spreading disinformation in an effort to keep people away from the polls.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Facebook Expands Efforts to Squash Voter Suppression
The social network will crack down on those spreading disinformation and looking to keep people away from the polls.
β ThreatList: Half of Execs Feel Unprepared to Respond to a Cyber-Incident β
π Read
via "The first stop for security news | Threatpost ".
Deloitte estimates cybercrime costs to reach $6 trillion annually -- but companies still lag in preparedness.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Half of Execs Feel Unprepared to Respond to a Cyber-Incident
Cybercrime costs are estimated to reach $6 trillion annually β but companies still lag in preparedness.
π How to train your employees to avoid online scams: 5 tips π
π Read
via "Security on TechRepublic".
According to Microsoft, online scammers are still tricking people with tech support scams, but there are ways to stay safe.π Read
via "Security on TechRepublic".
π΄ Rapid7 Acquires tCell π΄
π Read
via "Dark Reading: ".
The purchase brings together a cloud security platform with a web application firewall.π Read
via "Dark Reading: ".
Dark Reading
Rapid7 Acquires tCell
The purchase brings together a cloud security platform with a web application firewall.
β In County Crippled by Hurricane, Water Utility Targeted in Ransomware Attack β
π Read
via "The first stop for security news | Threatpost ".
The Emotet Trojan is behind a crippling ransomware attack that hit the Onslow Water and Sewer Authority.π Read
via "The first stop for security news | Threatpost ".
Threat Post
In County Crippled by Hurricane, Water Utility Targeted in Ransomware Attack
The Emotet Trojan is behind a crippling ransomware attack that hit the Onslow Water and Sewer Authority.
π Why are passwords terrible? π
π Read
via "Security on TechRepublic".
Microsoft's Diana Kelley explains all that's wrong with our passwords.π Read
via "Security on TechRepublic".
TechRepublic
Why are passwords terrible?
Microsoft's Diana Kelley explains all that's wrong with our passwords.
π΄ A Cybersecurity Weak Link: Linux and IoT π΄
π Read
via "Dark Reading: ".
Linux powers many of the IoT devices on which we've come to rely -- something that enterprises must address.π Read
via "Dark Reading: ".
Darkreading
A Cybersecurity Weak Link: Linux and IoT
Linux powers many of the IoT devices on which we've come to rely -- something that enterprises must address.
β Anthem, Apple and the Pentagon: A Data-Breach Cornucopia β
π Read
via "The first stop for security news | Threatpost ".
A record fine and two new compromises kick off the autumn compromise season.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Anthem, Apple and the Pentagon: A Data-Breach Cornucopia
A record fine and two new compromises kick off the autumn compromise season.
π How consumers can defend against credential stuffing π
π Read
via "Security on TechRepublic".
What should consumers be aware of, and what are some steps they could use to identify credential stuffing threats? Akamai's Andy Ellis offers tips to CNET's Dan Patterson.π Read
via "Security on TechRepublic".
TechRepublic
How consumers can defend against credential stuffing
What should consumers be aware of, and what are some steps they could use to identify credential stuffing threats? Akamai's Andy Ellis offers tips to CNET's Dan Patterson.
π Survey: How does your company handle cyberwarfare and cybersecurity? π
π Read
via "Security on TechRepublic".
Take this short, multiple choice survey and tell us about your company's cyberwarfare experience and cybersecurity strategies for the upcoming year.π Read
via "Security on TechRepublic".
TechRepublic
Survey: How does your company handle cyberwarfare and cybersecurity?
Take this short, multiple choice survey and tell us about your company's cyberwarfare experience and cybersecurity strategies for the upcoming year.
β As End of Life Nears, More Than Half of Websites Still Use PHP V5 β
π Read
via "The first stop for security news | Threatpost ".
Support for PHP 5.6 drops on December 31 - but a recent report found that almost 62 percent of websites are still using version 5.π Read
via "The first stop for security news | Threatpost ".
Threat Post
As End of Life Nears, More Than Half of Websites Still Use PHP V5
Support for PHP 5.6 drops on December 31 - but a recent report found that almost 62 percent of websites are still using version 5.
π΄ FICO & US Chamber of Commerce Score Cyber-Risk Across 10 Sectors π΄
π Read
via "Dark Reading: ".
Media, telecom, and technology firms are far more likely to experience a data breach in the near future than organizations in sectors including energy, construction, and transportation.π Read
via "Dark Reading: ".
Dark Reading
FICO & US Chamber of Commerce Score Cyber-Risk Across 10 Sectors
Media, telecom, and technology firms are far more likely to experience a data breach in the near future than organizations in sectors including energy, construction, and transportation.
β Donald Daters app for pro-Trump singles exposes usersβ data at launch β
π Read
via "Naked Security".
A security researcher found a publicly exposed Firebase data repository that was hardcoded in the dating app.π Read
via "Naked Security".
Naked Security
Donald Daters app for pro-Trump singles exposes usersβ data at launch
A security researcher found a publicly exposed Firebase data repository that was hardcoded in the dating app.
β Remote Code Implantation Flaw Found in Medtronic Cardiac Programmers β
π Read
via "The first stop for security news | Threatpost ".
The flaw impacted patients with pacemakers, implantable defibrillators, cardiac resynchronization devices and insertable cardiac monitors.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Remote Code Implantation Flaw Found in Medtronic Cardiac Programmers
The flaw impacted patients with pacemakers, implantable defibrillators, cardiac resynchronization devices and insertable cardiac monitors.
π How Florida is bolstering election security after being targeted by Russian hackers π
π Read
via "Security on TechRepublic".
Ahead of the 2018 midterms, Florida counties targeted by Russian phishing attacks are hardening their networks and increasing cybersecurity training for election officials.π Read
via "Security on TechRepublic".
TechRepublic
How Florida is bolstering election security after being targeted by Russian hackers
Ahead of the 2018 midterms, Florida counties targeted by Russian phishing attacks are hardening their networks and increasing cybersecurity training for election officials.
β 35 million US voter records up for sale on the dark web β
π Read
via "Naked Security".
He or she is selling off the databases by state. Kansas's voter database has already been sold and published, and Oregon is next up for sale.π Read
via "Naked Security".
Naked Security
35 million US voter records up for sale on the dark web
He or she is selling off the databases by state. Kansasβs voter database has already been sold and published, and Oregon is next up for sale.
β Is this the simple solution to password re-use? β
π Read
via "Naked Security".
Researchers concluded that passphrase requirements such as a 15-character minimum length deter the majority users from reusing them on other sites.π Read
via "Naked Security".
Naked Security
Is this the simple solution to password re-use?
Researchers concluded that passphrase requirements such as a 15-character minimum length deter the majority users from reusing them on other sites.
β New iPhone lock screen bypass exposes your photos β
π Read
via "Naked Security".
JosΓ© RodrΓguez has demonstrated how an attacker with physical access to a device running iOS 12.0.1 can gain access to photos stored on it.π Read
via "Naked Security".
Naked Security
New iPhone lock screen bypass exposes your photos
JosΓ© RodrΓguez has demonstrated how an attacker with physical access to a device running iOS 12.0.1 can gain access to photos stored on it.