π΄ Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures π΄
π Read
via "Dark Reading: ".
The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.π Read
via "Dark Reading: ".
Dark Reading
Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures
The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.
π The Biggest Incidents in Cybersecurity (in the Past 10 Years) (Infographic) π
π Read
via "Subscriber Blog RSS Feed ".
Looking back at the last 10 years, what are the biggest and most notable incidents in cybersecurity history? We created an infographic that reflects on the decade and can educate users on how to prevent the next major incident.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
The Biggest Incidents in Cybersecurity (in the Past 10 Years) (Infographic)
Looking back at the last 10 years, what are the biggest and most notable incidents in cybersecurity history? We created an infographic that reflects on the decade and can educate users on how to prevent the next major incident.
π Blockchain is promising but it can't save the world π
π Read
via "Security on TechRepublic".
TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.π Read
via "Security on TechRepublic".
TechRepublic
Blockchain is promising but it can't save the world
TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.
π Blockchain is promising but it can't save the world π
π Read
via "Security on TechRepublic".
TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin and IoT connected devices.π Read
via "Security on TechRepublic".
TechRepublic
Blockchain is promising, but it can't save the world
TechRepublic's Karen Roby talks with a cryptocurrency expert about blockchain, bitcoin, and IoT-connected devices.
π΄ SailPoint Buys Orkus and OverWatchID to Strengthen Cloud Access Governance π΄
π Read
via "Dark Reading: ".
The $37.5 million acquisitions will boost SailPoint's portfolio across all cloud platforms.π Read
via "Dark Reading: ".
Dark Reading
SailPoint Buys Orkus and OverWatchID to Strengthen Cloud Access Governance
The $37.5 million acquisitions will boost SailPoint's portfolio across all cloud platforms.
β 10 Steps for Ransomware Protection β
π Read
via "Threatpost".
Here are things you can do right now to shore up your defenses and help your recovery when you get hit.π Read
via "Threatpost".
Threat Post
10 Steps for Ransomware Protection
Here are things you can do right now to shore up your defenses and help your recovery when you get hit.
ATENTIONβΌ New - CVE-2015-9470 (history_collection)
π Read
via "National Vulnerability Database".
The history-collection plugin through 1.1.1 for WordPress has directory traversal via the download.php var parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9457 (pretty_link)
π Read
via "National Vulnerability Database".
The pretty-link plugin before 1.6.8 for WordPress has PrliLinksController::list_links SQL injection via the group parameter.π Read
via "National Vulnerability Database".
π΄ Cybersecurity Advice From Betty White π΄
π Read
via "Dark Reading: ".
Among the beloved entertainer's advice: "Double bag those passwords."Thanks, Betty.π Read
via "Dark Reading: ".
Dark Reading
Cybersecurity Advice From Betty White
Among the beloved entertainer's advice: Double bag those passwords.Thanks, Betty.
π΄ How to Build a Rock-Solid Cybersecurity Culture π΄
π Read
via "Dark Reading: ".
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.π Read
via "Dark Reading: ".
Dark Reading
How to Build a Rock-Solid Cybersecurity Culture
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.
π΄ Typosquatting Websites Proliferate in Run-up to US Elections π΄
π Read
via "Dark Reading: ".
People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.π Read
via "Dark Reading: ".
Dark Reading
Typosquatting Websites Proliferate in Run-up to US Elections
People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.
ATENTIONβΌ New - CVE-2015-9469 (content-grabber)
π Read
via "National Vulnerability Database".
The content-grabber plugin 1.0 for WordPress has XSS via obj_field_name or obj_field_id.π Read
via "National Vulnerability Database".
β Adobe fixes 46 critical bugs in patchfest β
π Read
via "Naked Security".
Adobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.π Read
via "Naked Security".
Naked Security
Adobe fixes 46 critical bugs in patchfest
Adobe patched a total of 82 vulnerabilities across a range of products on Tuesday, including 46 critical bugs.
β Hackers hack card details from BriansClub carding site β
π Read
via "Naked Security".
They stole 26 million credit cards from the massive black market site, and now financial institutions are ensuring the cards can't be abused.π Read
via "Naked Security".
Naked Security
Hackers hack card details from BriansClub carding site
They stole 26 million credit cards from the massive black market site, and now financial institutions are ensuring the cards canβt be abused.
β Robotic hand solves Rubikβs Cube by learning how to learn about it β
π Read
via "Naked Security".
The system figured out how to overcome little hurdles, like being nudged by a stuffed giraffe when trying to do important robot work.π Read
via "Naked Security".
Naked Security
Robotic hand solves Rubikβs Cube by learning how to learn about it
The system figured out how to overcome little hurdles, like being nudged by a stuffed giraffe when trying to do important robot work.
β Pen testers find mystery black box connected to shipβs engines β
π Read
via "Naked Security".
It had an Ethernet connection to the ship LAN but was also connected to a Windows console on the bridge which was so bright at night the crew had covered it up. The assumption had been that it was meant to be there.π Read
via "Naked Security".
Naked Security
Pen testers find mystery black box connected to shipβs engines
It had an Ethernet connection to the ship LAN but was also connected to a Windows console on the bridge which was so bright at night the crew had covered it up. The assumption had been that it was β¦
β S2 Ep 13: Weird Android zero day and other tech fails β Naked Security podcast β
π Read
via "Naked Security".
Listen to the latest episode now!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Palo Alto Networks discovers new cryptojacking worm mining for Monero π
π Read
via "Security on TechRepublic".
This is the first time that a cryptojacking attack has been observed on Docker.π Read
via "Security on TechRepublic".
TechRepublic
Palo Alto Networks discovers new cryptojacking worm mining for Monero
This is the first time that a cryptojacking attack has been observed on Docker.
π΄ Data Privacy Protections for the Most Vulnerable - Children π΄
π Read
via "Dark Reading: ".
The business case for why companies that respect the privacy of individuals, and especially minors, will have a strong competitive advantage.π Read
via "Dark Reading: ".
Dark Reading
Data Privacy Protections for the Most Vulnerable - Children
The business case for why companies that respect the privacy of individuals, and especially minors, will have a strong competitive advantage.
β Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS β
π Read
via "Threatpost".
The flaws in the container technology, CVE-2019-16276 and CVE-2019-11253, are simple to exploit.π Read
via "Threatpost".
Threat Post
Dangerous Kubernetes Bugs Allow Authentication Bypass, DoS
A pair of bugs in the Kubernetes open-source cloud container software can be βhighly dangerousβ under some Kubernetes configurations, according to researchers. The flaws, CVE-2019-16276 and CVE-2019-11253, have been patched in Kubernetes builds 1.14.8, 1.15.5β¦