ATENTIONβΌ New - CVE-2011-1933
π Read
via "National Vulnerability Database".
SQL injection vulnerability in Jifty::DBI before 0.68.π Read
via "National Vulnerability Database".
π How Microsoft is using hardware to secure firmware π
π Read
via "Security on TechRepublic".
Even full disk encryption can't keep you secure if your PC firmware is compromised, so Secured-core PCs will use the CPU to check if UEFI is telling the truth about secure boot.π Read
via "Security on TechRepublic".
TechRepublic
How Microsoft is using hardware to secure firmware
Even full disk encryption can't keep you secure if your PC firmware is compromised, so Secured-core PCs will use the CPU to check if UEFI is telling the truth about secure boot.
β Firefox gets tough on tracking tricks that sneakily sap your privacy β
π Read
via "Naked Security".
Firefox is getting ready to turn on its automatic anti-snooping tools to stop web 'fingerprinting" tricks.π Read
via "Naked Security".
Naked Security
Firefox gets tough on tracking tricks that sneakily sap your privacy
Firefox is getting ready to turn on its automatic anti-snooping tools to stop web βfingerprintingβ tricks.
β Police arrest alleged Chuckling Squad member who hijacked @Jack Dorsey β
π Read
via "Naked Security".
Debug, another Chuckling Squadder, told Motherboard that the kid was weird, "Swatting celebrities for a follow back."π Read
via "Naked Security".
Naked Security
Police arrest alleged Chuckling Squad member who hijacked @Jack Dorsey
Debug, another Chuckling Squadder, told Motherboard that the kid was weird, βSwatting celebrities for a follow back.β
β EU raises eyebrows at possible US encryption ban β
π Read
via "Naked Security".
EU officials have warned that they may not take kindly to a US encryption ban or insertion of crypto backdoor technology.π Read
via "Naked Security".
Naked Security
EU raises eyebrows at possible US encryption ban
EU officials have warned that they may not take kindly to a US encryption ban or insertion of crypto backdoor technology.
β Splunk customers should update now to dodge Y2K-style bug β
π Read
via "Naked Security".
Splunk has issued a critical warning regarding a showstopping Y2K-style date bug in one of the platformβs configuration files.π Read
via "Naked Security".
Naked Security
Splunk customers should update now to dodge Y2K-style bug
Splunk has issued a critical warning regarding a showstopping Y2K-style date bug in one of the platformβs configuration files.
β Facebook, Twitter profiles slurped by mobile apps using malicious SDKs β
π Read
via "Naked Security".
Hundreds of users gave permission to these third-party apps to access their social media accounts, but the apps got more handsy than that.π Read
via "Naked Security".
Naked Security
Facebook, Twitter profiles slurped by mobile apps using malicious SDKs
Hundreds of users gave permission to these third-party apps to access their social media accounts, but the apps got more handsy than that.
π What is HIPAA Compliance? 2019 HIPAA Requirements π
π Read
via "Subscriber Blog RSS Feed ".
Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.π Read
via "Subscriber Blog RSS Feed ".
Digitalguardian
What is HIPAA Compliance?
Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.
β Dexphot Malware Hijacked 80K+ Devices to Mine Cryptocurrency β
π Read
via "Threatpost".
A cryptomining malware has infected at least 80k devices and uses various tactics to evade detection.π Read
via "Threatpost".
Threat Post
Dexphot Malware Hijacked 80K+ Devices to Mine Cryptocurrency
A crypto-mining malware has infected at least 80k devices and boasts detection evasion tactics.
π΄ 7 Ways to Hang Up on Voice Fraud π΄
π Read
via "Dark Reading: ".
Criminals are coming at us from all direction, including our phones. Don't answer that next call without reading this tips first.π Read
via "Dark Reading: ".
Dark Reading
Slideshows - Dark Reading
Dark Reading: Connecting The Information Security Community. Explore our slideshows.
π΄ How to Be a More Thoughtful & Safe Digital Citizen π΄
π Read
via "Dark Reading: ".
Don't be a Billy ... or Jennie ... or Betty.π Read
via "Dark Reading: ".
Dark Reading
How to Be a More Thoughtful & Safe Digital Citizen
Don't be a Billy ... or Jennie ... or Betty.
π΄ Practical Principles for Security Metrics π΄
π Read
via "Dark Reading: ".
A proactive approach to cybersecurity requires the right tools, not more tools.π Read
via "Dark Reading: ".
Dark Reading
Practical Principles for Security Metrics
A proactive approach to cybersecurity requires the right tools, not more tools.
β Federal Data Privacy Bill Takes Aim at Tech Giants β
π Read
via "Threatpost".
The COPRA legislation would provide GDPR-like data protections, and create a new FTC enforcement bureau.π Read
via "Threatpost".
Threat Post
Federal Data Privacy Bill Takes Aim at Tech Giants
The COPRA legislation would provide GDPR-like data protections, and create a new FTC enforcement bureau.
β IoT Smartwatch Exposes Kidsβ Personal, GPS Data β
π Read
via "Threatpost".
Yet another connected smartwatch for children has been discovered exposing personal and location data of kids - opening the door for various insidious threats.π Read
via "Threatpost".
Threat Post
IoT Smartwatch Exposes Kidsβ Personal, GPS Data
Yet another connected smartwatch for children has been discovered exposing personal and location data of kids - opening the door for various insidious threats.
π΄ 7 Ways to Hang Up on Voice Fraud π΄
π Read
via "Dark Reading: ".
Criminals are coming at us from all direction, including our phones. Don't answer that next call without reading this tips first.π Read
via "Dark Reading: ".
Dark Reading
7 Ways to Hang Up on Voice Fraud
Criminals are coming at us from all direction, including our phones. Don't answer that next call without reading this tips first.
π Packet Fence 9.2.0 π
π Go!
via "Security Tool Files β Packet Storm".
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Packet Fence 9.2.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ How to Get Prepared for Privacy Legislation π΄
π Read
via "Dark Reading: ".
All the various pieces of legislation, both in the US and worldwide, can feel overwhelming. But getting privacy basics right is a solid foundation.π Read
via "Dark Reading: ".
Dark Reading
How to Get Prepared for Privacy Legislation
All the various pieces of legislation, both in the US and worldwide, can feel overwhelming. But getting privacy basics right is a solid foundation.
π΄ New Free Emulator Challenges Apple's Control of iOS π΄
π Read
via "Dark Reading: ".
An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system - and gives Apple a new headache.π Read
via "Dark Reading: ".
Dark Reading
New Free Emulator Challenges Apple's Control of iOS
An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system - and gives Apple a new headache.
π΄ Google Details Its Responses to Cyber Attacks, Disinformation π΄
π Read
via "Dark Reading: ".
Government groups continue to attack user credentials and distribute disinformation according to a new blog post from Google's Threat Analysis Group.π Read
via "Dark Reading: ".
Darkreading
Google Details Its Responses to Cyber Attacks, Disinformation
Government groups continue to attack user credentials and distribute disinformation according to a new blog post from Google's Threat Analysis Group.
π΄ Analysis of Jira Bug Stresses Impact of SSRF in Public Cloud π΄
π Read
via "Dark Reading: ".
More than 3,100 Jira instances are still vulnerable to a server-side request forgery vulnerability patched in August.π Read
via "Dark Reading: ".
Dark Reading
Analysis of Jira Bug Stresses Impact of SSRF in Public Cloud
More than 3,100 Jira instances are still vulnerable to a server-side request forgery vulnerability patched in August.
β SDKs Misused to Scrape Twitter, Facebook Account Info β
π Read
via "Threatpost".
Malicious mobile apps could be created to scrape and share profile information, email addresses and more.π Read
via "Threatpost".
Threat Post
SDKs Misused to Scrape Twitter, Facebook Account Info
Malicious mobile apps could be created to scrape and share profile information, email addresses and more.