β #FacebookLockout: Users who report fake/scam accounts locked out β
π Read
via "Naked Security".
Users report bad accounts, got presented with a request to verify ID, couldn't upload said ID, and got frozen out.π Read
via "Naked Security".
Naked Security
#FacebookLockout: Users who report fake/scam accounts locked out
Users report bad accounts, got presented with a request to verify ID, couldnβt upload said ID, and got frozen out.
β Microsoft lets Xbox users censor what messages they see β
π Read
via "Naked Security".
Xbox gamers: fed up with seeing profanity in messages from other gamers? Microsoft has you covered.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β€1
β Pitney Bowes and Groupe M6 join ransomwareβs victim list β
π Read
via "Naked Security".
Two more large organisations find themselves struggling after a ransomware attack...π Read
via "Naked Security".
Naked Security
Pitney Bowes and Groupe M6 join ransomwareβs victim list
Two more large organisations find themselves struggling after a ransomware attackβ¦
β Food writer Jack Monroe loses at least Β£5,000 in SIM-swap fraud β
π Read
via "Naked Security".
Her accounts were drained in spite of 2FA: SIM swaps are the easiest way around what's still a good security tool.π Read
via "Naked Security".
Naked Security
Food writer Jack Monroe loses at least Β£5,000 in SIM-swap fraud
Her accounts were drained in spite of using 2FA, showing that SIM swaps can still circumvent whatβs a good security tool.
β Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector, Report β
π Read
via "Threatpost".
A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when the phone was encased by a third-party screen protector.π Read
via "Threatpost".
Threat Post
Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector: Report
A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when it was encased by a third-party screen protector.
β Cybercrime Tool Prices Bump Up in Dark Web Markets β
π Read
via "Threatpost".
A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.π Read
via "Threatpost".
Threat Post
Cybercrime Tool Prices Bump Up in Dark Web Markets
A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.
β New Presentation Template: Incident Response Reporting for Management β
π Read
via "Threatpost".
For many security decision-makers, the real challenge is communicating the ongoing IR process to their management.π Read
via "Threatpost".
Threat Post
New Presentation Template: Incident Response Reporting for Management
Every security professional knows itβs only a matter of time before their organization is breached. And even though most security-conscious organizations have implemented procedures and products to facilitate the incident response process, many security decisionβ¦
β Podcast: Departing Employees Could Mean Departing Data β
π Read
via "Threatpost".
Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today.π Read
via "Threatpost".
Threat Post
Podcast: Departing Employees Could Mean Departing Data
Threatpost talks to Digital Guardian's Tim Bandos about the top insider threats that enterprises are facing today.
π How to protect your organization's website against typosquatting π
π Read
via "Security on TechRepublic".
Hundreds of fake domains have been set up against some of the presidential candidates through typosquatting, according to a report from digital risk company Digital Shadows.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your organization's website against typosquatting
Hundreds of fake domains have been set up against some of the presidential candidates through typosquatting, according to a report from digital risk company Digital Shadows.
π΄ Federal CIOs Zero In on Zero Trust π΄
π Read
via "Dark Reading: ".
Here's how federal CIOs can begin utilizing the security concept and avoid predictable obstacles.π Read
via "Dark Reading: ".
Darkreading
Federal CIOs Zero In on Zero Trust
Here's how federal CIOs can begin utilizing the security concept and avoid predictable obstacles.
π How to password protect a zip file in Linux π
π Read
via "Security on TechRepublic".
If you need to password protect a zip file, look no farther than the zip command itself.π Read
via "Security on TechRepublic".
TechRepublic
How to password protect a zip file in Linux
If you need to password protect a zip file, look no farther than the zip command itself.
π How to password protect a zip file in Linux π
π Read
via "Security on TechRepublic".
If you need to password protect a zip file, look no farther than the zip command itself.π Read
via "Security on TechRepublic".
TechRepublic
How to password protect a zip file in Linux
If you need to password protect a zip file, look no farther than the zip command itself.
ATENTIONβΌ New - CVE-2015-9475 (pont)
π Read
via "National Vulnerability Database".
The Pont theme 1.5 for WordPress has insufficient restrictions on option updates.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9474 (simpolio)
π Read
via "National Vulnerability Database".
The Simpolio theme 1.3.2 for WordPress has insufficient restrictions on option updates.π Read
via "National Vulnerability Database".
π΄ Cryptojacking Worm Targets and Infects 2,000 Docker Hosts π΄
π Read
via "Dark Reading: ".
Basic and 'inept' worm managed to compromise Docker hosts by exploiting misconfigurations.π Read
via "Dark Reading: ".
Dark Reading
Cryptojacking Worm Targets and Infects 2,000 Docker Hosts
Basic and 'inept' worm managed to compromise Docker hosts by exploiting misconfigurations.
β Docker Containers Riddled with Graboid Crypto-Worm β
π Read
via "Threatpost".
A worm with a randomized propagation method is spreading via the popular container technology.π Read
via "Threatpost".
Threat Post
Docker Containers Riddled with Graboid Crypto-Worm
A worm with a randomized propagation method is spreading via the popular container technology.
π΄ Google Cloud Launches Security Health Analytics in Beta π΄
π Read
via "Dark Reading: ".
The tool is designed to help identify misconfigurations and compliance violations in the Google Cloud Platform.π Read
via "Dark Reading: ".
Dark Reading
Google Cloud Launches Security Health Analytics in Beta
The tool is designed to help identify misconfigurations and compliance violations in the Google Cloud Platform.
β .WAVs Hide Malware in Their Depths in Innovative Campaign β
π Read
via "Threatpost".
Three different loaders and two payloads are hiding in audio files.π Read
via "Threatpost".
Threat Post
.WAVs Hide Malware in Their Depths in Innovative Campaign
Two different payloads are hiding in audio files, each paired with one of three loaders.
β Silent Librarian Retools Phishing Emails to Hook Student Credentials β
π Read
via "Threatpost".
Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.π Read
via "Threatpost".
Threat Post
Silent Librarian Retools Phishing Emails to Hook Student Credentials
Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.
π΄ Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures π΄
π Read
via "Dark Reading: ".
The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.π Read
via "Dark Reading: ".
Dark Reading
Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures
The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.