β Dunkinβ Donuts Gets Hit with Lawsuit Over 2015 Attack β
π Read
via "Threatpost".
Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.π Read
via "Threatpost".
Threat Post
Dunkinβ Donuts Gets Hit with Lawsuit Over 2015 Attack
Lawsuit alleges Dunkin' Donuts failed to act fast enough to notify and protect customers and is in violation of New York State data breach notification laws.
π Friday Five: 9/27 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 9/27 Edition
Vulnerable webcams, news on DHS' FISMA ratings, and a bug in vBulletin - catch up on the week's news with the Friday Five!
π΄ Cybersecurity Certification in the Spotlight Again π΄
π Read
via "Dark Reading: ".
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Certification in the Spotlight Again
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.
β Masad Spyware Uses Telegram Bots for Command-and-Control β
π Read
via "Threatpost".
The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.π Read
via "Threatpost".
Threat Post
Masad Spyware Uses Telegram Bots for Command-and-Control
The malware harvests data, steals cryptocurrency and drops additional malware, while masquerading as a Fortnite aimbot and more.
π΄ Apple Patches Multiple Vulnerabilities Across Platforms π΄
π Read
via "Dark Reading: ".
Updates address two separate issues in Apple's desktop and mobile operating systems.π Read
via "Dark Reading: ".
Dark Reading
Apple Patches Multiple Vulnerabilities Across Platforms
Updates address two separate issues in Apple's desktop and mobile operating systems.
β iOS Exploit βCheckm8β Could Allow Permanent iPhone Jailbreaks β
π Read
via "Threatpost".
A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.π Read
via "Threatpost".
Threat Post
iOS Exploit βCheckm8β Could Allow Permanent iPhone Jailbreaks
A new BootROM exploit - which is unpatchable - potentially opens the door to jailbreaks, a researcher said.
π΄ Cloud Vulnerability Could Let One Server Compromise Thousands π΄
π Read
via "Dark Reading: ".
A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.π Read
via "Dark Reading: ".
Dark Reading
Cloud Vulnerability Could Let One Server Compromise Thousands
A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.
π How to install and use the Cryptomator encryption tool π
π Read
via "Security on TechRepublic".
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use the Cryptomator encryption tool
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.
π How to install and use the Cryptomator encryption tool π
π Read
via "Security on TechRepublic".
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use the Cryptomator encryption tool
Looking for a user-friendly encryption tool? Look no further than the open source Cryptomator.
π Why smart home devices may be an open invitation to hackers π
π Read
via "Security on TechRepublic".
Recent breaches in Americans smart home systems have raised the level of concern with IoT devices.π Read
via "Security on TechRepublic".
TechRepublic
Why smart home devices may be an open invitation to hackers
Recent breaches in Americans smart home systems have raised the level of concern with IoT devices.
π΄ The Etiquette of Respecting Privacy in the Age of IoT π΄
π Read
via "Dark Reading: ".
Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years -- the descendants of Emily Post herself.π Read
via "Dark Reading: ".
Dark Reading
The Etiquette of Respecting Privacy in the Age of IoT
Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years -- the descendants of Emily Post herself.
β Monday review β the hot 24 stories of the week β
π Read
via "Naked Security".
From the fleeceware apps ripping off consumers to Microsoft's emergency IE patch - and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Is the era of social media Likes over? β
π Read
via "Naked Security".
Instagram's testing a program to hide the Likes that have created a toxic cyberbullying environment. Now, Facebook is as well.π Read
via "Naked Security".
Naked Security
Is the era of social media Likes over?
Instagramβs testing a program to hide the Likes that have created a toxic cyberbullying environment. Now, Facebook is as well.
β Outlook on the web bans a further 38 file types β
π Read
via "Naked Security".
Outlook on the web bans a further 38 file typesπ Read
via "Naked Security".
Naked Security
Outlook on the web bans a further 38 file types
Microsoft is about to put another 38 file extensions on its βtoo risky to receiveβ blocklist.
π Most Fortune 500 companies still opaque about security measures π
π Read
via "Security on TechRepublic".
A Bitglass survey said 52% of the world's most profitable companies do not have any language on their websites about how they protect the data of customers.π Read
via "Security on TechRepublic".
TechRepublic
Most Fortune 500 companies still opaque about security measures
A Bitglass survey said 52% of the world's most profitable companies do not have any language on their websites about how they protect the data of customers.
β Social media manipulation as a political tool is spreading β
π Read
via "Naked Security".
Researchers say 'cyber troops' in 70 countries are using it to automate suppression, mount smear campaigns, or spread disinformation.π Read
via "Naked Security".
Naked Security
Social media manipulation as a political tool is spreading
Researchers say βcyber troopsβ in 70 countries are using it to automate suppression, mount smear campaigns, or spread disinformation.
π΄ 8 Microsegmentation Pitfalls to Avoid π΄
π Read
via "Dark Reading: ".
Don't fall victim to these common mistakes on the path to developing better security boundaries and limiting the blast radius of security incidents.π Read
via "Dark Reading: ".
Dark Reading
8 Microsegmentation Pitfalls to Avoid
Don't fall victim to these common mistakes on the path to developing better security boundaries and limiting the blast radius of security incidents.
π΄ 'Harvesting Attacks' & the Quantum Revolution π΄
π Read
via "Dark Reading: ".
Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now.π Read
via "Dark Reading: ".
Darkreading
'Harvesting Attacks' & the Quantum Revolution
Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now.
β Critical Exim Flaw Opens Servers to Remote Code Execution β
π Read
via "Threatpost".
A fix has been issued for a critical Exim flaw that could lead to servers crashing or remote code execution attacks being launched.π Read
via "Threatpost".
Threat Post
Critical Exim Flaw Opens Servers to Remote Code Execution
A fix has been issued for a critical Exim flaw that could lead to servers crashing or remote code execution attacks being launched.
β Checkm8 jailbreak and AltStore put cracks in Appleβs walled garden β
π Read
via "Naked Security".
People are taking different tacks to get around Apple's tightly controlled phone rules.π Read
via "Naked Security".
Naked Security
Checkm8 jailbreak and AltStore put cracks in Appleβs walled garden
People are taking different tacks to get around Appleβs tightly controlled phone rules.