β Facebook urged by governments to halt end-to-end encryption plans β
π Read
via "Naked Security".
The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.π Read
via "Naked Security".
Naked Security
Facebook urged by governments to halt end-to-end encryption plans
The US, UK and Australian governments last week officially urged Facebook to halt its plans for end-to-end encryption.
β Android devices hit by zero-day exploit Google thought it had patched β
π Read
via "Naked Security".
Android smartphones have recently become vulnerable to a zero-day vulnerability that Google thought it had patched for good two years ago.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says β
π Read
via "Threatpost".
A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign.π Read
via "Threatpost".
Threat Post
Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says
A group called Phosphorous has been trying to access Microsoft-based email accounts of people associated with the campaign.
π΄ 10 Steps to Assess SOC Maturity in SMBs π΄
π Read
via "Dark Reading: ".
Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.π Read
via "Dark Reading: ".
Dark Reading
10 Steps to Assess SOC Maturity in SMBs
Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.
π Shifting allegiances of hackers causing confusion for defense efforts π
π Read
via "Security on TechRepublic".
According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.π Read
via "Security on TechRepublic".
TechRepublic
Shifting allegiances of hackers causing confusion for defense efforts
According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.
π Nevada's New Consumer Privacy Law Goes Into Effect π
π Read
via "Subscriber Blog RSS Feed ".
Nevada's new privacy law requires websites to post a privacy notice and allow consumers to opt out of the sale of their personal data.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Nevada's New Consumer Privacy Law Goes Into Effect
Nevada's new privacy law requires websites to post a privacy notice and allow consumers to opt out of the sale of their personal data.
β Alabama Hospitals Pay Up in Ransomware Attack β
π Read
via "Threatpost".
A trio of Alabama hospitals have decided to pay for a decryption key.π Read
via "Threatpost".
Threat Post
Alabama Hospitals Pay Up in Ransomware Attack
A trio of Alabama hospitals have decided to pay for a decryption key.
π Top 5 things to know about the splinternet π
π Read
via "Security on TechRepublic".
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about the splinternet
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.
π Top 5 things to know about the splinternet π
π Read
via "Security on TechRepublic".
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about the splinternet
As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.
π΄ Magecart Skimmers Spotted on 2M Websites π΄
π Read
via "Dark Reading: ".
Researchers say supply chain attacks are responsible for the most significant spikes in Magecart detections.π Read
via "Dark Reading: ".
Darkreading
Magecart Skimmers Spotted on 2M Websites
Researchers say supply chain attacks are responsible for the most significant spikes in Magecart detections.
β D-Link Home Routers Open to Remote Takeover Will Remain Unpatched β
π Read
via "Threatpost".
CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.π Read
via "Threatpost".
Threat Post
D-Link Home Routers Open to Remote Takeover Will Remain Unpatched
CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.
π΄ 6 Active Directory Security Tips for Your Poor, Neglected AD π΄
π Read
via "Dark Reading: ".
The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.π Read
via "Dark Reading: ".
Dark Reading
6 Active Directory Security Tips for Your Poor, Neglected AD
The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.
π Cybercriminals using gifs to corrupt Drupal sites π
π Read
via "Security on TechRepublic".
Hackers are taking advantage of vulnerabilities in the Drupal CMS platform by using malicious code disguised as gifs.π Read
via "Security on TechRepublic".
TechRepublic
Cybercriminals using gifs to corrupt Drupal sites
Hackers are taking advantage of vulnerabilities in the Drupal CMS platform by using malicious code disguised as gifs.
β Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks β
π Read
via "Threatpost".
Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps.π Read
via "Threatpost".
Threat Post
Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks
Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps.
β California Bans Deepfakes in Elections, Porn β
π Read
via "Threatpost".
A pair of laws provides recourse for victims of deepfake technology.π Read
via "Threatpost".
Threat Post
California Bans Deepfakes in Elections, Porn
A pair of laws provides recourse for victims of deepfake technology.
π΄ Drupalgeddon2 Vulnerability Still Endangering CMSes π΄
π Read
via "Dark Reading: ".
A new wave of attacks has been discovered on Drupal-based content management systems that weren't patched for the older flaw.π Read
via "Dark Reading: ".
Darkreading
Drupalgeddon2 Vulnerability Still Endangering CMSes
A new wave of attacks has been discovered on Drupal-based content management systems that weren't patched for the older flaw.
π΄ Lack of Role Models, Burnout & Pay Disparity Hold Women Back π΄
π Read
via "Dark Reading: ".
New ISACA data emphasizes a gap between men and women who share their opinions on underrepresentation of women and equal pay in the tech industry.π Read
via "Dark Reading: ".
Dark Reading
Lack of Role Models, Burnout & Pay Disparity Hold Women Back
New ISACA data emphasizes a gap between men and women who share their opinions on underrepresentation of women and equal pay in the tech industry.
β Facebookβs Libra cryptocurrency dealt blow by PayPalβs departure β
π Read
via "Naked Security".
PayPal abruptly announced that it was leaving the Libra Association.π Read
via "Naked Security".
Naked Security
Facebookβs Libra cryptocurrency dealt blow by PayPalβs departure
PayPal abruptly announced that it was leaving the Libra Association.
β Nationwide facial recognition ID program underway in France β
π Read
via "Naked Security".
It's coming next month, in spite of a lawsuit and the data regulator's protests about lack of consent, data security and privacy.π Read
via "Naked Security".
Naked Security
Nationwide facial recognition ID program underway in France
Itβs coming next month, in spite of a lawsuit and the data regulatorβs protests about lack of consent, data security and privacy.
β GPS tracker from stalked womanβs car led to indictment of 20 mobsters β
π Read
via "Naked Security".
Girlfriend found it, girlfriend popped it onto a city bus, gadget got found, multiyear investigation got launched, 20 got indicted.π Read
via "Naked Security".
Naked Security
GPS tracker from stalked womanβs car led to indictment of 20 mobsters
Girlfriend found it, girlfriend popped it onto a city bus, gadget got found, multiyear investigation got launched, 20 got indicted.