π How to add public SSH keys for users in Cockpit π
π Read
via "Security on TechRepublic".
Adding public SSH keys with Cockpit can easily be handled by a Cockpit admin.π Read
via "Security on TechRepublic".
TechRepublic
How to add public SSH keys for users in Cockpit
Adding public SSH keys with Cockpit can easily be handled by a Cockpit admin.
π΄ Older Amazon Devices Subject to Old Wi-Fi Vulnerability π΄
π Read
via "Dark Reading: ".
The vulnerability in first-generation Echoes and eight-generation Kindles lets an attacker wage man-in-the-middle attacks.π Read
via "Dark Reading: ".
Dark Reading
Older Amazon Devices Subject to Old Wi-Fi Vulnerability
The vulnerability in first-generation Echoes and eight-generation Kindles lets an attacker wage man-in-the-middle attacks.
π΄ Debug Feature in Web Dev Tool Exposed Trump Campaign Site, Others to Attack π΄
π Read
via "Dark Reading: ".
The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.π Read
via "Dark Reading: ".
Dark Reading
Debug Feature in Web Dev Tool Exposed Trump Campaign Site, Others to Attack
The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.
ATENTIONβΌ New - CVE-2015-9484 (accio_one_page_parallax_responsive_theme)
π Read
via "National Vulnerability Database".
The ThemeMakers Accio One Page Parallax Responsive theme through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9483 (invento_responsive_gallery/architecture_template)
π Read
via "National Vulnerability Database".
The ThemeMakers Invento Responsive Gallery/Architecture Template component through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.π Read
via "National Vulnerability Database".
β Much-attacked Baltimore uses βmind-bogglinglyβ bad data storage β
π Read
via "Naked Security".
IT workers have been storing files on their computers' hard drives. One councilman's alleged response: βThat canβt be right? Thatβs real?βπ Read
via "Naked Security".
Naked Security
Much-attacked Baltimore uses βmind-bogglinglyβ bad data storage
IT workers have been storing files on their computersβ hard drives. One councilmanβs alleged response: βThat canβt be right? Thatβs real?β
β S2 Ep13.5: All about social media: Growing up online, parent advice and social shaming β Naked Security Podcast β
π Read
via "Naked Security".
A special episode dedicated to social media culture!π Read
via "Naked Security".
Naked Security
S2 Ep13.5: All about social media: Growing up online, parent advice and social shaming β Naked Security Podcast
A special episode dedicated to social media culture!
β Bitcoin money trail leads cops to βworldβs largestβ child abuse site β
π Read
via "Naked Security".
The Darknet server running the site, "Welcome to Video", and the website's convicted admin were tracked down by a global police force.π Read
via "Naked Security".
Naked Security
Bitcoin money trail leads cops to βworldβs largestβ child abuse site
The Darknet server running the site, βWelcome to Videoβ, and the websiteβs convicted admin were tracked down by a global police force.
β Some Android adware apps hide icons to make it hard to remove them β
π Read
via "Naked Security".
SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the userβs device.π Read
via "Naked Security".
Naked Security
Some Android adware apps hide icons to make it hard to remove them
SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the userβs device.
β Zappos Offers Users 10% Discount in 2012 Breach Settlement β
π Read
via "Threatpost".
Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers.π Read
via "Threatpost".
Threat Post
Zappos Offers Users 10% Discount in 2012 Breach Settlement
Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers.
π΄ Learn About the Underground World of Anti-Cheats at Black Hat Europe π΄
π Read
via "Dark Reading: ".
Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption.π Read
via "Dark Reading: ".
Dark Reading
Learn About the Underground World of Anti-Cheats at Black Hat Europe
Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption.
β Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent β
π Read
via "Threatpost".
At what point will infiltrating companies via the "insider threat model" become less costly and difficult than using malware? Threatpost discusses with a SolarWind expert.π Read
via "Threatpost".
Threat Post
Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent
Lindsey OβDonnell: This is Lindsey OβDonnell with Threatpost. Welcome back to the Threatpost podcast. And Iβm joined today with Tim Brown, the Vice President of Security at SolarWinds. And weβre going to talk today about insider threats. So Tim, howβs itβ¦
π΄ SOC Puppet: Dark Reading Caption Contest Winners π΄
π Read
via "Dark Reading: ".
Social engineering, SOC analysts, and Sock puns. And the winners are:π Read
via "Dark Reading: ".
Dark Reading
SOC Puppet: Dark Reading Caption Contest Winners
Social engineering, SOC analysts, and Sock puns. And the winners are:
β Phishy text message tries to steal your cellphone account β
π Read
via "Naked Security".
Which sort of company is most likely to contact you via SMS? Why, your mobile phone provider, of course!π Read
via "Naked Security".
Naked Security
Phishy text message tries to steal your cellphone account
Which sort of company is most likely to contact you via SMS? Why, your mobile phone provider, of course!
π΄ Glitching: The Hardware Attack that can Disrupt Secure Software π΄
π Read
via "Dark Reading: ".
Glitching is difficult, complex, and dangerous. It's one of the reasons that physical security should be part of your cybersecurity planning, particularly as the IoT expands.π Read
via "Dark Reading: ".
Dark Reading
Glitching: The Hardware Attack that can Disrupt Secure Software
Glitching is difficult, complex, and dangerous. It's one of the reasons that physical security should be part of your cybersecurity planning, particularly as the IoT expands.
π΄ CenturyLink Customer Data Exposed π΄
π Read
via "Dark Reading: ".
Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.π Read
via "Dark Reading: ".
Darkreading
CenturyLink Customer Data Exposed
Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.
β Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise β
π Read
via "Threatpost".
A patch is currently under revision but has not yet been incorporated into the Linux kernel.π Read
via "Threatpost".
Threat Post
Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise
A patch is currently under revision but has not yet been incorporated into the Linux kernel.
β Major Airport Malware Attack Shines a Light on OT Security β
π Read
via "Threatpost".
A cryptomining infection spread to half of the workstations at a major international airport.π Read
via "Threatpost".
Threat Post
Major Airport Malware Attack Shines a Light on OT Security
A cryptomining infection spread to half of the workstations at a major international airport.
π Friday Five: 10/18 Edition π
π Read
via "Subscriber Blog RSS Feed ".
A new bill that could put execs in jail for not taking privacy seriously, Singapore hires 500 data protection officers, and more - catch up on the news of the week with the Friday Five!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 10/18 Edition
A new bill that could put execs in jail for not taking privacy seriously, Singapore hires 500 data protection officers, and more - catch up on the news of the week with the Friday Five!
β Execs Could Face Jail Time For Privacy Violations β
π Read
via "Threatpost".
The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies.π Read
via "Threatpost".
Threat Post
Execs Could Face Jail Time For Privacy Violations
The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies.