ATENTIONβΌ New - CVE-2015-9483 (invento_responsive_gallery/architecture_template)
π Read
via "National Vulnerability Database".
The ThemeMakers Invento Responsive Gallery/Architecture Template component through 2015-05-15 for WordPress allows remote attackers to obtain sensitive information (such as user_login, user_pass, and user_email values) via a direct request for the wp-content/uploads/tmm_db_migrate/wp_users.dat URI.π Read
via "National Vulnerability Database".
β Much-attacked Baltimore uses βmind-bogglinglyβ bad data storage β
π Read
via "Naked Security".
IT workers have been storing files on their computers' hard drives. One councilman's alleged response: βThat canβt be right? Thatβs real?βπ Read
via "Naked Security".
Naked Security
Much-attacked Baltimore uses βmind-bogglinglyβ bad data storage
IT workers have been storing files on their computersβ hard drives. One councilmanβs alleged response: βThat canβt be right? Thatβs real?β
β S2 Ep13.5: All about social media: Growing up online, parent advice and social shaming β Naked Security Podcast β
π Read
via "Naked Security".
A special episode dedicated to social media culture!π Read
via "Naked Security".
Naked Security
S2 Ep13.5: All about social media: Growing up online, parent advice and social shaming β Naked Security Podcast
A special episode dedicated to social media culture!
β Bitcoin money trail leads cops to βworldβs largestβ child abuse site β
π Read
via "Naked Security".
The Darknet server running the site, "Welcome to Video", and the website's convicted admin were tracked down by a global police force.π Read
via "Naked Security".
Naked Security
Bitcoin money trail leads cops to βworldβs largestβ child abuse site
The Darknet server running the site, βWelcome to Videoβ, and the websiteβs convicted admin were tracked down by a global police force.
β Some Android adware apps hide icons to make it hard to remove them β
π Read
via "Naked Security".
SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the userβs device.π Read
via "Naked Security".
Naked Security
Some Android adware apps hide icons to make it hard to remove them
SophosLabs has discovered 15 apps on Google Play that install without icons as a ploy to keep themselves on the userβs device.
β Zappos Offers Users 10% Discount in 2012 Breach Settlement β
π Read
via "Threatpost".
Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers.π Read
via "Threatpost".
Threat Post
Zappos Offers Users 10% Discount in 2012 Breach Settlement
Lawyers will get $1.6 million in a settlement that stems from a breach that affected more than 24 million customers.
π΄ Learn About the Underground World of Anti-Cheats at Black Hat Europe π΄
π Read
via "Dark Reading: ".
Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption.π Read
via "Dark Reading: ".
Dark Reading
Learn About the Underground World of Anti-Cheats at Black Hat Europe
Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption.
β Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent β
π Read
via "Threatpost".
At what point will infiltrating companies via the "insider threat model" become less costly and difficult than using malware? Threatpost discusses with a SolarWind expert.π Read
via "Threatpost".
Threat Post
Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent
Lindsey OβDonnell: This is Lindsey OβDonnell with Threatpost. Welcome back to the Threatpost podcast. And Iβm joined today with Tim Brown, the Vice President of Security at SolarWinds. And weβre going to talk today about insider threats. So Tim, howβs itβ¦
π΄ SOC Puppet: Dark Reading Caption Contest Winners π΄
π Read
via "Dark Reading: ".
Social engineering, SOC analysts, and Sock puns. And the winners are:π Read
via "Dark Reading: ".
Dark Reading
SOC Puppet: Dark Reading Caption Contest Winners
Social engineering, SOC analysts, and Sock puns. And the winners are:
β Phishy text message tries to steal your cellphone account β
π Read
via "Naked Security".
Which sort of company is most likely to contact you via SMS? Why, your mobile phone provider, of course!π Read
via "Naked Security".
Naked Security
Phishy text message tries to steal your cellphone account
Which sort of company is most likely to contact you via SMS? Why, your mobile phone provider, of course!
π΄ Glitching: The Hardware Attack that can Disrupt Secure Software π΄
π Read
via "Dark Reading: ".
Glitching is difficult, complex, and dangerous. It's one of the reasons that physical security should be part of your cybersecurity planning, particularly as the IoT expands.π Read
via "Dark Reading: ".
Dark Reading
Glitching: The Hardware Attack that can Disrupt Secure Software
Glitching is difficult, complex, and dangerous. It's one of the reasons that physical security should be part of your cybersecurity planning, particularly as the IoT expands.
π΄ CenturyLink Customer Data Exposed π΄
π Read
via "Dark Reading: ".
Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.π Read
via "Dark Reading: ".
Darkreading
CenturyLink Customer Data Exposed
Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.
β Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise β
π Read
via "Threatpost".
A patch is currently under revision but has not yet been incorporated into the Linux kernel.π Read
via "Threatpost".
Threat Post
Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise
A patch is currently under revision but has not yet been incorporated into the Linux kernel.
β Major Airport Malware Attack Shines a Light on OT Security β
π Read
via "Threatpost".
A cryptomining infection spread to half of the workstations at a major international airport.π Read
via "Threatpost".
Threat Post
Major Airport Malware Attack Shines a Light on OT Security
A cryptomining infection spread to half of the workstations at a major international airport.
π Friday Five: 10/18 Edition π
π Read
via "Subscriber Blog RSS Feed ".
A new bill that could put execs in jail for not taking privacy seriously, Singapore hires 500 data protection officers, and more - catch up on the news of the week with the Friday Five!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 10/18 Edition
A new bill that could put execs in jail for not taking privacy seriously, Singapore hires 500 data protection officers, and more - catch up on the news of the week with the Friday Five!
β Execs Could Face Jail Time For Privacy Violations β
π Read
via "Threatpost".
The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies.π Read
via "Threatpost".
Threat Post
Execs Could Face Jail Time For Privacy Violations
The bill is a direct shot at big tech companies like Facebook as senators try to reel in data-collection policies.
π What is a Zero Day Vulnerability? π
π Read
via "Security on TechRepublic".
Find out what a Zero Day Vulnerability is and if there's anything you can do to protect yourself against them.π Read
via "Security on TechRepublic".
TechRepublic
What is a zero-day vulnerability? | TechRepublic
Find out what a zero-day vulnerability is and if there's anything you can do to protect yourself against them.
π΄ In A Crowded Endpoint Security Market, Consolidation Is Underway π΄
π Read
via "Dark Reading: ".
Experts examine the drivers pushing today's endpoint security market to consolidate as its many players compete to meet organizations' changing demands and transition to the cloud.π Read
via "Dark Reading: ".
Dark Reading
In A Crowded Endpoint Security Market, Consolidation Is Underway
Experts examine the drivers pushing today's endpoint security market to consolidate as its many players compete to meet organizations' changing demands and transition to the cloud.
π΄ Tor Weaponized to Steal Bitcoin π΄
π Read
via "Dark Reading: ".
A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser.π Read
via "Dark Reading: ".
Darkreading
Tor Weaponized to Steal Bitcoin
A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser.
π Why compliance concerns are pushing more big companies to the cloud π
π Read
via "Security on TechRepublic".
Cloud migration is accelerating as companies face compliance, security, and control concerns.π Read
via "Security on TechRepublic".
TechRepublic
Why compliance concerns are pushing more big companies to the cloud
Cloud migration is accelerating as companies face compliance, security, and control concerns.