β AWS FreeRTOS Bugs Allow Compromise of IoT Devices β
π Read
via "The first stop for security news | Threatpost ".
The bugs let hackers crash IoT devices, leak their information, and completely take them over.π Read
via "The first stop for security news | Threatpost ".
Threat Post
AWS FreeRTOS Bugs Allow Compromise of IoT Devices
The bugs let hackers crash IoT devices, leak their information, and completely take them over.
π Apple Pay: A cheat sheet π
π Read
via "Security on TechRepublic".
Apple Pay is a mobile payment solution that's accepted by millions of retailers in various countries. This guide covers what you need to know to use Apple Pay.π Read
via "Security on TechRepublic".
TechRepublic
Apple Pay: A cheat sheet
Apple Pay is a mobile payment solution that's accepted by millions of retailers in various countries. This guide covers what you need to know to use Apple Pay.
π΄ WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors π΄
π Read
via "Dark Reading: ".
A report by the Wall Street Journal points finger at group that is know to Facebook Security.π Read
via "Dark Reading: ".
Dark Reading
Application Security recent news | Dark Reading
Explore the latest news and expert commentary on Application Security, brought to you by the editors of Dark Reading
π΄ EU Takes Step Toward Cyberattack Sanctions π΄
π Read
via "Dark Reading: ".
European leaders complete first step toward establishing a sanctions regime.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π΄ Google Patch to Block Spectre Slowdown in Windows 10 π΄
π Read
via "Dark Reading: ".
Microsoft will incorporate Google's Retpoline patch to prevent Spectre Variant 2 from slowing down its operating system.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
β Two Critical RCE Bugs Patched in Drupal 7 and 8 β
π Read
via "The first stop for security news | Threatpost ".
Drupal's advisory also included three patches for "moderately critical" bugs.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Two Critical RCE Bugs Patched in Drupal 7 and 8
Drupalβs advisory also included three patches for βmoderately criticalβ bugs.
β Monday review β the hot 20 stories of the week β
π Read
via "Naked Security".
From a serious libssh bug to the sextortionists that spoof your email address, and all the stories in between. Catch up with everything we've written in the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 20 stories of the week
From a serious libssh bug to the sextortionists that spoof your email address, and all the stories in between. Catch up with everything weβve written in the last seven days β itβsβ¦
β Maker of LuminosityLink RAT gets 30 months in the clink β
π Read
via "Naked Security".
Prosecutors said that the 21-year-old LuminosityLink author had no respect for the law and showed contempt for moral rules and social norms.π Read
via "Naked Security".
Naked Security
Maker of LuminosityLink RAT gets 30 months in the clink
Prosecutors said that the 21-year-old LuminosityLink author had no respect for the law and showed contempt for moral rules and social norms.
β Up to 9.5 million net neutrality comments were fake β
π Read
via "Naked Security".
New York has expanded its probe to subpoena 14 industry groups and lobbyists, saying that fake comments "distort[ed] public opinion."π Read
via "Naked Security".
Naked Security
Up to 9.5 million net neutrality comments were fake
New York has expanded its probe to subpoena 14 industry groups and lobbyists, saying that fake comments βdistort[ed] public opinion.β
β Alleged robber busted after Facebook-friending victim to apologize β
π Read
via "Naked Security".
He told her to put down the pizza delivery and all her money on top of it. 26 days later, he found her on Facebook and reached out.π Read
via "Naked Security".
Naked Security
Alleged robber busted after Facebook-friending victim to apologize
He told her to put down the pizza delivery and all her money on top of it. 26 days later, he found her on Facebook and reached out.
β Popular website plugin harboured a serious 0-day for years β
π Read
via "Naked Security".
The flaw in the popular file uploader allows an attacker to upload files and run their own command line shell on any affected server.π Read
via "Naked Security".
Naked Security
Popular website plugin harboured a serious 0-day for years
The flaw in the popular file uploader allows an attacker to upload files and run their own command line shell on any affected server.
π΄ Understanding SOCs' 4 Top Deficiencies π΄
π Read
via "Dark Reading: ".
In most cases, the areas that rankle SANS survey respondents the most about security operations centers can be addressed with the right mix of planning, policies, and procedures.π Read
via "Dark Reading: ".
Dark Reading
Understanding SOCs' 4 Top Deficiencies
In most cases, the areas that rankle SANS survey respondents the most about security operations centers can be addressed with the right mix of planning, policies, and procedures.
β Critical Bug Impacts Live555 Media Streaming Libraries β
π Read
via "The first stop for security news | Threatpost ".
A critical streaming bug impacts Live Networks LIVE555 RTSPServer, but not the popular VLC and MPLayer client-side software.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Critical Bug Impacts Live555 Media Streaming Libraries
A critical streaming bug impacts Live Networks LIVE555 RTSPServer, but not the popular VLC and MPLayer client-side software.
β Obamacare Sign-Up Channel Breach Affects 75K Consumers β
π Read
via "The first stop for security news | Threatpost ".
A hack targeted the Direct Enrollment pathway, which allows insurance agents and brokers to help consumers sign up for Affordable Care Act coverage.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Obamacare Sign-Up Channel Breach Affects 75K Consumers
A hack targeted the Direct Enrollment pathway, which allows insurance agents and brokers to help consumers sign up for Affordable Care Act coverage.
β The Danger and Opportunity in 5G Connectivity and IoT β
π Read
via "The first stop for security news | Threatpost ".
The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world.π Read
via "The first stop for security news | Threatpost ".
Threat Post
The Danger and Opportunity in 5G Connectivity and IoT
The advent of 5G presents an opportunity for us to think the exploding number of IoT devices and how we securely connect to the digital world.
π Why cybersecurity dominates concerns surrounding AI adoption π
π Read
via "Security on TechRepublic".
Even though artificial intelligence adoption is high, concerns regarding legal and ethical risks persist.π Read
via "Security on TechRepublic".
TechRepublic
Why cybersecurity dominates concerns surrounding AI adoption
Even though artificial intelligence adoption is high, concerns regarding legal and ethical risks persist.
π΄ Gartner Experts Highlight Tech Trends - And Their Security Risks π΄
π Read
via "Dark Reading: ".
Security must be built into systems and applications from the beginning of the design process, they agreed.π Read
via "Dark Reading: ".
Dark Reading
Gartner Experts Highlight Tech Trends - And Their Security Risks
Security must be built into systems and applications from the beginning of the design process, they agreed.
π Quantum computing: A cheat sheet π
π Read
via "Security on TechRepublic".
This resource covers the future of computing in the post-transistor age, and the technical hurdles inherent in the pursuit of quantum computing.π Read
via "Security on TechRepublic".
TechRepublic
Quantum computing: A cheat sheet
IBM, Honeywell, and Intel are just three companies leading the way in building quantum machines as well as the algorithms and controls to run them. Learn about possible business use cases for quantum.
π Ransomware: A cheat sheet for professionals π
π Read
via "Security on TechRepublic".
This guide covers Locky, WannaCry, Petya, and other ransomware attacks, the systems hackers target, and how to avoid becoming a victim and paying cybercriminals a ransom in the event of an infection.π Read
via "Security on TechRepublic".
TechRepublic
Ransomware: A cheat sheet for professionals
This guide covers Locky, WannaCry, Petya, and other ransomware attacks, the systems hackers target, and how to avoid becoming a victim and paying cybercriminals a ransom in the event of an infection.
π΄ Healthcare.gov FFE Breach Compromises 75K Users' Data π΄
π Read
via "Dark Reading: ".
Attackers broke into a sign-up system used by healthcare insurance agents and brokers to help consumers apply for coverage.π Read
via "Dark Reading: ".
Darkreading
Healthcare.gov FFE Breach Compromises 75K Users' Data
Attackers broke into a sign-up system used by healthcare insurance agents and brokers to help consumers apply for coverage.
π How to detect hardware-based server bugs π
π Read
via "Security on TechRepublic".
Following controversy from a recent Bloomberg report, here's how you should approach auditing physical hardware security.π Read
via "Security on TechRepublic".
TechRepublic
How to detect hardware-based server bugs
Following controversy from a recent Bloomberg report, here's how you should approach auditing physical hardware security.