ATENTIONβΌ New - CVE-2011-2177
π Read
via "National Vulnerability Database".
OpenOffice.org v3.3 allows execution of arbitrary code with the privileges of the user running the OpenOffice.org suite tools.π Read
via "National Vulnerability Database".
β NSO Group President Defends Controversial Tactics β
π Read
via "Threatpost".
Firm defends controversial business offerings, claims it should be considered a force of good.π Read
via "Threatpost".
Threat Post
NSO Group President Defends Controversial Tactics
Firm defends controversial business offerings, claims it should be considered a force of good.
π΄ A Cause You Care About Needs Your Cybersecurity Help π΄
π Read
via "Dark Reading: ".
By donating their security expertise, infosec professionals are supporting non-profits, advocacy groups, and communities in-need.π Read
via "Dark Reading: ".
Dark Reading
A Cause You Care About Needs Your Cybersecurity Help
By donating their security expertise, infosec professionals are supporting non-profits, advocacy groups, and communities in-need.
ATENTIONβΌ New - CVE-2011-2480
π Read
via "National Vulnerability Database".
Information Disclosure vulnerability in the 802.11 stack, as used in FreeBSD before 8.2 and NetBSD when using certain non-x86 architectures. A signedness error in the IEEE80211_IOC_CHANINFO ioctl allows a local unprivileged user to cause the kernel to copy large amounts of kernel memory back to the user, disclosing potentially sensitive information.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-2207
π Read
via "National Vulnerability Database".
dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to cause a denial of service (DOS) via a specially-crafted certificate.π Read
via "National Vulnerability Database".
π΄ Edge Feature Section π΄
π Read
via "Dark Reading: ".
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen bookπ Read
via "Dark Reading: ".
Dark Reading
Edge Feature Section - Dark Reading
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book
ATENTIONβΌ New - CVE-2011-2717
π Read
via "National Vulnerability Database".
The DHCPv6 client (dhcp6c) as used in the dhcpv6 project through 2011-07-25 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-2523
π Read
via "National Vulnerability Database".
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-2515
π Read
via "National Vulnerability Database".
PackageKit 0.6.17 allows installation of unsigned RPM packages as though they were signed which may allow installation of non-trusted packages and execution of arbitrary code.π Read
via "National Vulnerability Database".
β Twitter says it wonβt delete tweets from those who have died β
π Read
via "Naked Security".
It "was a miss on our part", Twitter said.π Read
via "Naked Security".
Naked Security
Twitter says it wonβt delete tweets from those who have died
It βwas a miss on our partβ, Twitter said.
β HPE warns of impending SSD disk doom β
π Read
via "Naked Security".
The company has revealed that many of its SSDs are set to permanently fail by default after 32,768 hours of operation.π Read
via "Naked Security".
Naked Security
HPE warns of impending SSD disk doom
The company has revealed that many of its SSDs are set to permanently fail by default after 32,768 hours of operation.
β Ransomware attack freezes health records access at 110 nursing homes β
π Read
via "Naked Security".
In some cases, nurses canβt update and order drugs. For one assisted-living facility, lack of timely Medicaid billing could force closure.π Read
via "Naked Security".
Naked Security
Ransomware attack freezes health records access at 110 nursing homes
In some cases, nurses canβt update and order drugs. For one assisted-living facility, lack of timely Medicaid billing could force closure.
β Kidsβ smartwatch security tracker can be hacked by anyone β
π Read
via "Naked Security".
For researchers at testing outfit AV-Test, the SMA M2 kidsβ smartwatch is just the tip of an iceberg of terrible security.π Read
via "Naked Security".
Naked Security
Kidsβ smartwatch security tracker can be hacked by anyone
For researchers at testing outfit AV-Test, the SMA M2 kidsβ smartwatch is just the tip of an iceberg of terrible security.
β S2 Ep18: Missing cryptoqueen, festive phishing and can the web be saved? β Naked Security Podcast β
π Read
via "Naked Security".
New episode available now!π Read
via "Naked Security".
Naked Security
S2 Ep18: Missing cryptoqueen, festive phishing and can the web be saved? β Naked Security Podcast
New episode available now!
π Cybersecurity in 2020: More targeted attacks, AI not a prevention panacea π
π Read
via "Security on TechRepublic".
As cloud complexity increases, hackers are relying on more targeted attacks, scoping out weak points across a larger attack surface.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity in 2020: More targeted attacks, AI not a prevention panacea
As cloud complexity increases, hackers are relying on more targeted attacks, scoping out weak points across a larger attack surface.
β ThreatList: Healthcare Breaches Spike in October β
π Read
via "Threatpost".
38 million consumer health records have been exposed so far in 2019.π Read
via "Threatpost".
Threat Post
ThreatList: Healthcare Breaches Spike in October
38 million consumer health records have been exposed so far in 2019.
π The sinister timing of deepfakes and the 2020 election π
π Read
via "Security on TechRepublic".
Education and legislation are needed to combat the significant threat of deepfakes.π Read
via "Security on TechRepublic".
TechRepublic
The sinister timing of deepfakes and the 2020 election
Education and legislation are needed to combat the significant threat of deepfakes.
β Stay safe on Black Friday β and the rest of the year, too! β
π Read
via "Naked Security".
Watch our latest Naked Security Live video for some handy and practical cybersecurity tips - for Black Friday and beyond.π Read
via "Naked Security".
Naked Security
Stay safe on Black Friday β and the rest of the year, too!
Watch our latest Naked Security Live video for some handy and practical cybersecurity tips β for Black Friday and beyond.
β Master Go player retires citing AI supremacy β
π Read
via "Naked Security".
Master Go player Lee Se-dol has handed in his stones after deciding that there's just no way to beat a machine when playing the ancient Chinese board game.π Read
via "Naked Security".
Naked Security
Master Go player retires citing AI supremacy
Master Go player Lee Se-dol has handed in his stones after deciding that thereβs just no way to beat a machine when playing the ancient Chinese board game.