β βFleecewareβ Play store apps quietly charging up to $250 β
π Read
via "Naked Security".
SophosLabs researchers discovered at least 15 apps with millions of downloads charging extraordinary prices right under the Google's nose.π Read
via "Naked Security".
Naked Security
βFleecewareβ Play store apps quietly charging up to $250
SophosLabs researchers discovered at least 15 apps with millions of downloads charging extraordinary prices right under Googleβs nose.
π΄ Is Your Organization Suffering from Security Tool Sprawl? π΄
π Read
via "Dark Reading: ".
Most companies have too many tools, causing increased costs and security issues.π Read
via "Dark Reading: ".
Dark Reading
Is Your Organization Suffering from Security Tool Sprawl?
Most companies have too many tools, causing increased costs and security issues.
ATENTIONβΌ New - CVE-2014-10396 (epic)
π Read
via "National Vulnerability Database".
The epic theme through 2014-09-07 for WordPress allows arbitrary file downloads via the file parameter to includes/download.php.π Read
via "National Vulnerability Database".
π΄ DoorDash Breach Affects 4.9M Merchants, Customers, Workers π΄
π Read
via "Dark Reading: ".
The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.π Read
via "Dark Reading: ".
Darkreading
DoorDash Breach Affects 4.9M Merchants, Customers, Workers
The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.
β Microsoft Blacklists Dozens of New File Extensions in Outlook β
π Read
via "Threatpost".
In total, Microsoft has now blocked 142 file extensions that it deems as at risk or that are typically sent as malicious attachments in emails.π Read
via "Threatpost".
Threat Post
Microsoft Blacklists Dozens of New File Extensions in Outlook
In total, Microsoft has now blocked 142 file extensions that it deems as at risk or that are typically sent as malicious attachments in emails.
β Arcane Stealer V Takes Aim at the Low End of the Dark Web β
π Read
via "Threatpost".
This data-harvesting tool is perfect for the deep well of low-skilled adversaries looking to make their cybercrime mark.π Read
via "Threatpost".
Threat Post
Arcane Stealer V Takes Aim at the Low End of the Dark Web
This data-harvesting tool is perfect for the deep well of low-skilled adversaries looking to make their cybercrime mark.
β Dunkinβ Donuts Gets Hit with Lawsuit Over 2015 Attack β
π Read
via "Threatpost".
Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.π Read
via "Threatpost".
Threat Post
Dunkinβ Donuts Gets Hit with Lawsuit Over 2015 Attack
Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.
π Friday Five: 9/27 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 9/27 Edition
Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!
π΄ Cybersecurity Certification in the Spotlight Again π΄
π Read
via "Dark Reading: ".
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Certification in the Spotlight Again
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.
β Masad Spyware Uses Telegram Bots for Command-and-Control β
π Read
via "Threatpost".
The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.π Read
via "Threatpost".
Threat Post
Masad Spyware Uses Telegram Bots for Command-and-Control
The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.
π΄ Apple Patches Multiple Vulnerabilities Across Platforms π΄
π Read
via "Dark Reading: ".
Updates address two separate issues in Apple's desktop and mobile operating systems.π Read
via "Dark Reading: ".
Dark Reading
Apple Patches Multiple Vulnerabilities Across Platforms
Updates address two separate issues in Apple's desktop and mobile operating systems.
β iOS Exploit βCheckm8β Could Allow Permanent iPhone Jailbreaks β
π Read
via "Threatpost".
A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.π Read
via "Threatpost".
Threat Post
iOS Exploit βCheckm8β Could Allow Permanent iPhone Jailbreaks
A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.
π΄ Cloud Vulnerability Could Let One Server Compromise Thousands π΄
π Read
via "Dark Reading: ".
A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.π Read
via "Dark Reading: ".
Dark Reading
Cloud Vulnerability Could Let One Server Compromise Thousands
A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.
π How to install and use the Cryptomator encryption tool π
π Read
via "Security on TechRepublic".
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use the Cryptomator encryption tool
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.
π How to install and use the Cryptomator encryption tool π
π Read
via "Security on TechRepublic".
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use the Cryptomator encryption tool
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.
π Why smart home devices may be an open invitation to hackers π
π Read
via "Security on TechRepublic".
Recent breaches in Americans smart home systems have raised the level of concern with IoT devices.π Read
via "Security on TechRepublic".
TechRepublic
Why smart home devices may be an open invitation to hackers
Recent breaches in Americans smart home systems have raised the level of concern with IoT devices.
π΄ The Etiquette of Respecting Privacy in the Age of IoT π΄
π Read
via "Dark Reading: ".
Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years -- the descendants of Emily Post herself.π Read
via "Dark Reading: ".
Dark Reading
The Etiquette of Respecting Privacy in the Age of IoT
Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years -- the descendants of Emily Post herself.
β Monday review β the hot 24 stories of the week β
π Read
via "Naked Security".
From the fleeceware apps ripping off consumers to Microsoft's emergency IE patch - and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Is the era of social media Likes over? β
π Read
via "Naked Security".
Instagram's testing a program to hide the Likes that have created a toxic cyberbullying environment. Now, Facebook is as well.π Read
via "Naked Security".
Naked Security
Is the era of social media Likes over?
Instagramβs testing a program to hide the Likes that have created a toxic cyberbullying environment. Now, Facebook is as well.
β Outlook on the web bans a further 38 file types β
π Read
via "Naked Security".
Outlook on the web bans a further 38 file typesπ Read
via "Naked Security".
Naked Security
Outlook on the web bans a further 38 file types
Microsoft is about to put another 38 file extensions on its βtoo risky to receiveβ blocklist.