π΄ Cartoon Contest: Second Wind π΄
π Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading: ".
Dark Reading
Cartoon Contest: Second Wind
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
β PDF encryption standard weaknesses uncovered β
π Read
via "Naked Security".
Researchers have discovered weaknesses in PDF encryption which could be exploited to reveal the plaintext contents of a file to an attacker.π Read
via "Naked Security".
Naked Security
PDF encryption standard weaknesses uncovered
Researchers have discovered weaknesses in PDF encryption which could be exploited to reveal the plaintext contents of a file to an attacker.
β No federal privacy law will make it in the US this year, sources say β
π Read
via "Naked Security".
Without one, the companies that collect our data will likely face compliance with California's take-no-prisoners law, in effect 1 January 2020.π Read
via "Naked Security".
Naked Security
No federal privacy law will make it in the US this year, sources say
Without one, the companies that collect our data will likely face compliance with Californiaβs take-no-prisoners law, in effect 1 January 2020.
β WhatsApp Flaw Opens Android Devices to Remote Code Execution β
π Read
via "Threatpost".
A double-free bug could allow an attacker to achieve remote code execution; users are encouraged to update to a patched version of the messaging app.π Read
via "Threatpost".
Threat Post
WhatsApp Flaw Opens Android Devices to Remote Code Execution
A double-free bug could allow an attacker to achieve remote code execution; users encouraged to update to patched version of messaging app.
π΄ How FISMA Requirements Relate to Firmware Security π΄
π Read
via "Dark Reading: ".
Federal guidelines can help all organizations pragmatically and meaningfully improve their firmware security.π Read
via "Dark Reading: ".
Darkreading
How FISMA Requirements Relate to Firmware Security
Federal guidelines can help all organizations pragmatically and meaningfully improve their firmware security.
π΄ 20M Russians' Personal Tax Records Exposed in Data Leak π΄
π Read
via "Dark Reading: ".
An unprotected Elasticsearch cluster contained personally identifiable information on Russian citizens from 2009 to 2016.π Read
via "Dark Reading: ".
Dark Reading
20M Russians' Personal Tax Records Exposed in Data Leak
An unprotected Elasticsearch cluster contained personally identifiable information on Russian citizens from 2009 to 2016.
β Foxit PDF Reader Vulnerable to 8 High-Severity Flaws β
π Read
via "Threatpost".
Eight high-severity vulnerabilities exist in the Foxit Reader tool for editing PDF files.π Read
via "Threatpost".
Threat Post
Foxit PDF Reader Vulnerable to 8 High-Severity Flaws
Eight high-severity vulnerabilities exist in the Foxit Reader tool for editing PDF files.
π Black Hat 2019: Monitoring network operations and managing digital risks π
π Read
via "Security on TechRepublic".
Black Hat's Network Operations team members discuss looking for the "bad within the bad." Also, RSA's CTO talks about managing risks to prevent an individual problem from becoming a societal problem.π Read
via "Security on TechRepublic".
TechRepublic
Black Hat 2019: Monitoring network operations and managing digital risks
Black Hat's Network Operations team members discuss looking for the "bad within the bad." Also, RSA's CTO talks about managing risks to prevent an individual problem from becoming a societal problem.
π How to protect your organization against insider threats π
π Read
via "Security on TechRepublic".
Whether intentionally or unintentionally, employees can pose a significant security risk to company data, according to a new report from data protection firm Code42.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your organization against insider threats
Whether intentionally or unintentionally, employees can pose a significant security risk to company data, according to a new report from data protection firm Code42.
π California Privacy Rights and Enforcement Act Would Further Reign in Data Privacy π
π Read
via "Subscriber Blog RSS Feed ".
On top of the forthcoming California Consumer Privacy Act, a new ballot initiative seeks to tamp down data privacy even further in the state.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
California Privacy Rights and Enforcement Act Would Further Reign in Data Privacy
On top of the forthcoming California Consumer Privacy Act, a new ballot initiative seeks to tamp down data privacy even further in the state.
π Black Hat 2019: Monitoring network operations and managing digital risks π
π Read
via "Security on TechRepublic".
Black Hat's Network Operations team members discuss looking for the "bad within the bad." Also, RSA's CTO talks about managing risks to prevent an individual problem from becoming a societal problem.π Read
via "Security on TechRepublic".
TechRepublic
Black Hat 2019: Monitoring network operations and managing digital risks
Black Hat's Network Operations team members discuss looking for the "bad within the bad." Also, RSA's CTO talks about managing risks to prevent an individual problem from becoming a societal problem.
ATENTIONβΌ New - CVE-2018-16452
π Read
via "National Vulnerability Database".
The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16451
π Read
via "National Vulnerability Database".
The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16301
π Read
via "National Vulnerability Database".
libpcap, as used in tcpdump before 4.9.3, has a buffer overflow and/or over-read.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16300
π Read
via "National Vulnerability Database".
The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16230
π Read
via "National Vulnerability Database".
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16229
π Read
via "National Vulnerability Database".
The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16228
π Read
via "National Vulnerability Database".
The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16227
π Read
via "National Vulnerability Database".
The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-14882
π Read
via "National Vulnerability Database".
The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.π Read
via "National Vulnerability Database".