β Hackerβs parents sentenced for selling his cryptocurrency β
π Read
via "Naked Security".
"You misguidedly tried to help your son" by moving his cryptocurrency, but it "didn't help him at all," a judge said.π Read
via "Naked Security".
Naked Security
Hackerβs parents sentenced for selling his cryptocurrency
βYou misguidedly tried to help your sonβ by moving his cryptocurrency, but it βdidnβt help him at all,β a judge said.
β AG Barr, Officials to Facebook: Donβt Encrypt Messaging β
π Read
via "Threatpost".
Officials say they are concerned about their ability to fight crime and protect citizens, while privacy advocates remain critical of government interferenceπ Read
via "Threatpost".
Threat Post
AG Barr, Officials to Facebook: Donβt Encrypt Messaging
Officials say they are concerned about their ability to fight crime and protect citizens, while privacy advocates remain critical of government interference
π΄ Time to Put This 'Toon to Bed π΄
π Read
via "Dark Reading: ".
The winning captions for September's cartoon contest are nothing to yawn about.π Read
via "Dark Reading: ".
Dark Reading
Time to Put This 'Toon to Bed
The winning captions for September's cartoon contest are nothing to yawn about.
β Β£3 billion Safari iPhone privacy lawsuit given go-ahead β
π Read
via "Naked Security".
A UK class action lawsuit against Google, that represents around 5 million iPhone users, can go ahead, according to the UK Court of Appeal.π Read
via "Naked Security".
Naked Security
Β£3 billion Safari iPhone privacy lawsuit given go-ahead
A UK class action lawsuit against Google, that represents around 5 million iPhone users, can go ahead, according to the UK Court of Appeal.
β WhatsApp vulnerability could compromise Android smartphones β
π Read
via "Naked Security".
A researcher has released details of a WhatsApp flaw that could be used to compromise the app and the mobile device the app is running on.π Read
via "Naked Security".
Naked Security
WhatsApp vulnerability could compromise Android smartphones
A researcher has released details of a WhatsApp flaw that could be used to compromise the app and the mobile device the app is running on.
π΄ 8 Ways Businesses Unknowingly Help Hackers π΄
π Read
via "Dark Reading: ".
From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.π Read
via "Dark Reading: ".
Darkreading
8 Ways Businesses Unknowingly Help Hackers
From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.
β S2 Ep11: Fleeceware, Chrome bug and the sextortion scam that wonβt die β Naked Security Podcast β
π Read
via "Naked Security".
Listen to the latest episode of our podcast now.π Read
via "Naked Security".
Naked Security
S2 Ep11: Fleeceware, Chrome bug and the sextortion scam that wonβt die β Naked Security Podcast
Listen to the latest episode of our podcast now.
π΄ Cybercrime: AI's Growing Threat π΄
π Read
via "Dark Reading: ".
Cyberecurity incidents expected to rise by nearly 70% and cost $5 trillion annually by 2024.π Read
via "Dark Reading: ".
Dark Reading
Cybercrime: AI's Growing Threat
Cyberecurity incidents expected to rise by nearly 70% and cost $5 trillion annually by 2024.
β Buying a new laptop? Hereβs how to secure it β
π Read
via "Naked Security".
Getting the basics right gives you a lot of protection. Here's how.π Read
via "Naked Security".
Naked Security
Buying a new laptop? Hereβs how to secure it
Getting the basics right gives you a lot of protection. Hereβs how.
β Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier β
π Read
via "Threatpost".
An attacker whose motives are unclear compromised an Asterisk server in a highly targeted campaign.π Read
via "Threatpost".
Threat Post
Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier
An attacker whose motives are unclear compromised an Asterisk server in a highly targeted campaign.
π΄ Complex Environments Cause Schools to Struggle for Passing Security Grade π΄
π Read
via "Dark Reading: ".
As ransomware attacks surge against school systems, an analysis of 1,200 K-12 institutions in North America shows complex environments and conflicting security controls.π Read
via "Dark Reading: ".
Dark Reading
Complex Environments Cause Schools to Struggle for Passing Security Grade
As ransomware attacks surge against school systems, an analysis of 1,200 K-12 institutions in North America shows complex environments and conflicting security controls.
π΄ Android 0-Day Seen Exploited in the Wild π΄
π Read
via "Dark Reading: ".
The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices.π Read
via "Dark Reading: ".
Darkreading
Android 0-Day Seen Exploited in the Wild
The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices.
β Google Warns of Android Zero-Day Bug Under Active Attack β
π Read
via "Threatpost".
Flaw impacts 18 Android models including Googleβs flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi.π Read
via "Threatpost".
Threat Post
Google Warns of Android Zero-Day Bug Under Active Attack
Flaw impacts 18 Android models including Googleβs flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi.
π Friday Five: 10/4 Edition π
π Read
via "Subscriber Blog RSS Feed ".
News on new vulnerabilities - both in the PDF format and a network protocol, and why fighting cyber crime is a focal point of the U.S. Secret Service.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 10/4 Edition
News on new vulnerabilities - both in the PDF format and a network protocol, and why fighting cyber crime is a focal point of the U.S. Secret Service.
ATENTIONβΌ New - CVE-2018-11768
π Read
via "National Vulnerability Database".
In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.π Read
via "National Vulnerability Database".
π΄ FBI Investigates Mobile Voting Intrusion π΄
π Read
via "Dark Reading: ".
A group tried to access West Virginia's mobile voting app in 2018; now, the FBI is looking into what actually happened.π Read
via "Dark Reading: ".
Dark Reading
Application Security recent news | Dark Reading
Explore the latest news and expert commentary on Application Security, brought to you by the editors of Dark Reading
π΄ Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage' π΄
π Read
via "Dark Reading: ".
In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?π Read
via "Dark Reading: ".
Dark Reading
Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage'
In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need?
π΄ Iran Caught Targeting US Presidential Campaign Accounts π΄
π Read
via "Dark Reading: ".
Microsoft detected the so-called Phosphorus nation-state gang attacking 241 user accounts associated with a US presidential campaign, current and former US government officials, journalists, others.π Read
via "Dark Reading: ".
Darkreading
Iran Caught Targeting US Presidential Campaign Accounts
Microsoft detected the so-called Phosphorus nation-state gang attacking 241 user accounts associated with a US presidential campaign, current and former US government officials, journalists, others.
π WhatWeb Scanner 0.5.0 π
π Go!
via "Security Tool Files β Packet Storm".
WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
WhatWeb Scanner 0.5.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Zeek 3.0.0 (Formerly Known As Bro) π
π Go!
via "Security Tool Files β Packet Storm".
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Zeek 3.0.0 (Formerly Known As Bro) β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers