β Sextortionist whisks away sex tapes using just a phone number β
π Read
via "Naked Security".
The SIM-swap victim knew he was in trouble when he got a 3:30 a.m. message about his phone service being cut off.π Read
via "Naked Security".
Naked Security
Sextortionist whisks away sex tapes using just a phone number
The SIM-swap victim knew he was in trouble when he got a 3:30 a.m. message about his phone service being cut off.
π1
β Microsoft to Apply Californiaβs Privacy Law to All U.S. Users β
π Read
via "Threatpost".
The move takes a broader stand to protect user data and support the requirements of CCPA nationwide.π Read
via "Threatpost".
Threat Post
Microsoft to Apply Californiaβs Privacy Law to All U.S. Users
The move takes a broader stand to protect user data and support the requirements of CCPA nationwide.
β Nvidia patches graphics products and GeForce Experience update tool β
π Read
via "Naked Security".
The update fixes 11 mainly high-severity security flaws in Windows and GeForce graphics card drivers, including three in the program used to update them.π Read
via "Naked Security".
Naked Security
Nvidia patches graphics products and GeForce Experience update tool
The update fixes 11 mainly high-severity security flaws in Windows and GeForce graphics card drivers, including three in the program used to update them.
β Apple to fix Siri bug that exposed parts of encrypted emails β
π Read
via "Naked Security".
Apple may care about your privacy but that doesn't mean it gets it right all the time, especially when it comes to training its Siri AI assistant.π Read
via "Naked Security".
Naked Security
Apple to fix Siri bug that exposed parts of encrypted emails
Apple may care about your privacy but that doesnβt mean it gets it right all the time, especially when it comes to training its Siri AI assistant.
π΄ Why Cyber-Risk Is a C-Suite Issue π΄
π Read
via "Dark Reading: ".
Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.π Read
via "Dark Reading: ".
Darkreading
Why Cyber-Risk Is a C-Suite Issue
Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.
π Reasonable doubt: Only 17% of CISOs believe their stack is "completely effective" against attacks π
π Read
via "Security on TechRepublic".
An overabundance of confidence can lead to blind spots, but a Nominet report finds widespread doubt in organizations' security posture.π Read
via "Security on TechRepublic".
TechRepublic
Reasonable doubt: Only 17% of CISOs believe their stack is "completely effective" against attacks
An overabundance of confidence can lead to blind spots, but a Nominet report finds widespread doubt in organizations' security posture.
π How firewall automation can help prevent breaches caused by wrong configurations π
π Read
via "Security on TechRepublic".
A majority of IT staffers polled by firewall management service FireMon said they still use manual processes to manage changes.π Read
via "Security on TechRepublic".
TechRepublic
How firewall automation can help prevent breaches caused by wrong configurations
A majority of IT staffers polled by firewall management service FireMon said they still use manual processes to manage changes.
π΄ DDoS Attack Targets UK Labour Party Weeks Ahead of Election π΄
π Read
via "Dark Reading: ".
Cybercriminals tried to take the Labour Party's digital platforms offline weeks before the election on December 12.π Read
via "Dark Reading: ".
Darkreading
DDoS Attack Targets UK Labour Party Weeks Ahead of Election
Cybercriminals tried to take the Labour Party's digital platforms offline weeks before the election on December 12.
π΄ SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing? π΄
π Read
via "Dark Reading: ".
The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.π Read
via "Dark Reading: ".
Darkreading
SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.
β Adobe Patches Critical Bugs in Illustrator, Media Encoder β
π Read
via "Threatpost".
Adobeβs monthly patch load is low for November, with only three critical bugs fixed and eight important.π Read
via "Threatpost".
Threat Post
Adobe Patches Critical Bugs in Illustrator, Media Encoder
Adobeβs monthly patch load is low for November, with only three critical bugs and eight important ones fixed.
β Magento Warns E-Commerce Sites to Upgrade ASAP to Prevent Attacks β
π Read
via "Threatpost".
The platform is a favorite target for the Magecart collective of card-skimming threat groups.π Read
via "Threatpost".
Threat Post
Magento Warns E-Commerce Sites to Upgrade ASAP to Prevent Attacks
The platform is a favorite target for the Magecart collective of card-skimming threat groups.
β Intel Warns of Critical Info-Disclosure Bug in Security Engine β
π Read
via "Threatpost".
The issue is in an Intel chip used for remote management.π Read
via "Threatpost".
Threat Post
Intel Warns of Critical Info-Disclosure Bug in Security Engine
The issue is in an Intel chip used for remote management.
π IBM social engineer easily hacked two journalists' information π
π Read
via "Security on TechRepublic".
A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.π Read
via "Security on TechRepublic".
TechRepublic
IBM social engineer easily hacked two journalists' information
A member of IBM's X-Force Red team hacked two CBS reporters for three weeks. Find out what information she gathered, as well as what phishing entails.
π Counterterrorism expert: Small healthcare companies are the new ransomware targets π
π Read
via "Security on TechRepublic".
MonsterCloud CEO says RYUK attacks can be fatal for businesses that can't afford to pay the ransom or to get help from experts.π Read
via "Security on TechRepublic".
TechRepublic
Counterterrorism expert: Small healthcare companies are the new ransomware targets
MonsterCloud CEO says RYUK attacks can be fatal for businesses that can't afford to pay the ransom or to get help from experts.
π Senator Seeking Answers Following Medical Image Breach π
π Read
via "Subscriber Blog RSS Feed ".
In wake of a massive breach, a U.S. Senator is pressing the U.S. Department of Health and Human Services to explain how it oversees medical imaging security.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Senator Seeking Answers Following Medical Image Breach
In wake of a massive breach, a U.S. Senator is pressing the U.S. Department of Health and Human Services to explain how it oversees medical imaging security.
π What happens when your healthcare data is stolen or held for ransom? It depends π
π Read
via "Security on TechRepublic".
Hospitals are reluctant to disclose attacks, and regulations don't offer clear advice about what to tell patients.π Read
via "Security on TechRepublic".
TechRepublic
What happens when your healthcare data is stolen or held for ransom? It depends
Hospitals are reluctant to disclose attacks, and regulations don't offer clear advice about what to tell patients.
π΄ Researchers Disclose New Vulnerabilities in Windows Drivers π΄
π Read
via "Dark Reading: ".
Attackers could take advantage of simple design flaws in widely distributed drivers to gain control over Windows systems.π Read
via "Dark Reading: ".
Dark Reading
Researchers Disclose New Vulnerabilities in Windows Drivers
Attackers could take advantage of simple design flaws in widely distributed drivers to gain control over Windows systems.
π΄ The Myths of Multifactor Authentication π΄
π Read
via "Dark Reading: ".
Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back?π Read
via "Dark Reading: ".
Dark Reading
The Myths of Multifactor Authentication
Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back?
β Plugging the Data Leak in Manufacturing β
π Read
via "Threatpost".
IIoT-generated data β calibrations, measurements and other parameters β still need to be stored, managed and shared securely.π Read
via "Threatpost".
Threat Post
Plugging the Data Leak in Manufacturing
IIoT-generated data β calibrations, measurements and other parameters β still need to be stored, managed and shared securely.
π΄ New DDoS Attacks Leverage TCP Amplification π΄
π Read
via "Dark Reading: ".
Attackers over the past month have been using a rarely seen approach to disrupt services at large organizations in several countries.π Read
via "Dark Reading: ".
Darkreading
New DDoS Attacks Leverage TCP Amplification
Attackers over the past month have been using a rarely seen approach to disrupt services at large organizations in several countries.
β Microsoft Patches RCE Bug Actively Under Attack β
π Read
via "Threatpost".
Microsoft tackles 74 bugs as part of its November Patch Tuesday security bulletin.π Read
via "Threatpost".
Threat Post
Microsoft Patches RCE Bug Actively Under Attack
Microsoft tackles 74 bugs as part of its November Patch Tuesday security bulletin.