ATENTIONβΌ New - CVE-2011-2717
π Read
via "National Vulnerability Database".
The DHCPv6 client (dhcp6c) as used in the dhcpv6 project through 2011-07-25 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-2523
π Read
via "National Vulnerability Database".
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-2515
π Read
via "National Vulnerability Database".
PackageKit 0.6.17 allows installation of unsigned RPM packages as though they were signed which may allow installation of non-trusted packages and execution of arbitrary code.π Read
via "National Vulnerability Database".
β Twitter says it wonβt delete tweets from those who have died β
π Read
via "Naked Security".
It "was a miss on our part", Twitter said.π Read
via "Naked Security".
Naked Security
Twitter says it wonβt delete tweets from those who have died
It βwas a miss on our partβ, Twitter said.
β HPE warns of impending SSD disk doom β
π Read
via "Naked Security".
The company has revealed that many of its SSDs are set to permanently fail by default after 32,768 hours of operation.π Read
via "Naked Security".
Naked Security
HPE warns of impending SSD disk doom
The company has revealed that many of its SSDs are set to permanently fail by default after 32,768 hours of operation.
β Ransomware attack freezes health records access at 110 nursing homes β
π Read
via "Naked Security".
In some cases, nurses canβt update and order drugs. For one assisted-living facility, lack of timely Medicaid billing could force closure.π Read
via "Naked Security".
Naked Security
Ransomware attack freezes health records access at 110 nursing homes
In some cases, nurses canβt update and order drugs. For one assisted-living facility, lack of timely Medicaid billing could force closure.
β Kidsβ smartwatch security tracker can be hacked by anyone β
π Read
via "Naked Security".
For researchers at testing outfit AV-Test, the SMA M2 kidsβ smartwatch is just the tip of an iceberg of terrible security.π Read
via "Naked Security".
Naked Security
Kidsβ smartwatch security tracker can be hacked by anyone
For researchers at testing outfit AV-Test, the SMA M2 kidsβ smartwatch is just the tip of an iceberg of terrible security.
β S2 Ep18: Missing cryptoqueen, festive phishing and can the web be saved? β Naked Security Podcast β
π Read
via "Naked Security".
New episode available now!π Read
via "Naked Security".
Naked Security
S2 Ep18: Missing cryptoqueen, festive phishing and can the web be saved? β Naked Security Podcast
New episode available now!
π Cybersecurity in 2020: More targeted attacks, AI not a prevention panacea π
π Read
via "Security on TechRepublic".
As cloud complexity increases, hackers are relying on more targeted attacks, scoping out weak points across a larger attack surface.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity in 2020: More targeted attacks, AI not a prevention panacea
As cloud complexity increases, hackers are relying on more targeted attacks, scoping out weak points across a larger attack surface.
β ThreatList: Healthcare Breaches Spike in October β
π Read
via "Threatpost".
38 million consumer health records have been exposed so far in 2019.π Read
via "Threatpost".
Threat Post
ThreatList: Healthcare Breaches Spike in October
38 million consumer health records have been exposed so far in 2019.
π The sinister timing of deepfakes and the 2020 election π
π Read
via "Security on TechRepublic".
Education and legislation are needed to combat the significant threat of deepfakes.π Read
via "Security on TechRepublic".
TechRepublic
The sinister timing of deepfakes and the 2020 election
Education and legislation are needed to combat the significant threat of deepfakes.
β Stay safe on Black Friday β and the rest of the year, too! β
π Read
via "Naked Security".
Watch our latest Naked Security Live video for some handy and practical cybersecurity tips - for Black Friday and beyond.π Read
via "Naked Security".
Naked Security
Stay safe on Black Friday β and the rest of the year, too!
Watch our latest Naked Security Live video for some handy and practical cybersecurity tips β for Black Friday and beyond.
β Master Go player retires citing AI supremacy β
π Read
via "Naked Security".
Master Go player Lee Se-dol has handed in his stones after deciding that there's just no way to beat a machine when playing the ancient Chinese board game.π Read
via "Naked Security".
Naked Security
Master Go player retires citing AI supremacy
Master Go player Lee Se-dol has handed in his stones after deciding that thereβs just no way to beat a machine when playing the ancient Chinese board game.
β Pressure mounts for federal privacy law with second bill β
π Read
via "Naked Security".
Pressure is gathering for a federal privacy law in the US with the introduction of a second bill that would protect consumer data.π Read
via "Naked Security".
Naked Security
Pressure mounts for federal privacy law with second bill
Pressure is gathering for a federal privacy law in the US with the introduction of a second bill that would protect consumer data.
β Adobeβs Magento Marketplace suffers data breach β
π Read
via "Naked Security".
Adobeβs Magento Marketplace has suffered a data breach, the company has said in an email sent to customers.π Read
via "Naked Security".
Naked Security
Adobeβs Magento Marketplace suffers data breach
Adobeβs Magento Marketplace has suffered a data breach, the company has said in an email sent to customers.
β US tightens rules on drone use in policy update β
π Read
via "Naked Security".
When it comes to managing drones (Unmanned Aircraft Systems, or UAS) the US Department of Justice wants Americans to know itβs on the case.π Read
via "Naked Security".
Naked Security
US tightens rules on drone use in policy update
When it comes to managing drones (Unmanned Aircraft Systems, or UAS) the US Department of Justice wants Americans to know itβs on the case.
β Amazon Plans Ring Facial Recognition-Based βWatch List:β Report β
π Read
via "Threatpost".
Amazon's facial recognition would alert Ring users if "suspicious" individuals are near their house.π Read
via "Threatpost".
Threat Post
Amazon Plans Ring Facial Recognition-Based βWatch Listβ, Report
Amazon's facial recognition would alert Ring users if "suspicious" individuals are near their house.
β Netflix account freeze β donβt click, itβs a scam! β
π Read
via "Naked Security".
The telltale signs are all there... but if you're in a hurry, this Netflix scam passes the "visual appeal" test.π Read
via "Naked Security".
Naked Security
Netflix account freeze β donβt click, itβs a scam!
The telltale signs are all thereβ¦ but if youβre in a hurry, this Netflix scam passes the βvisual appealβ test.
π How credential stuffing attacks work, and how to prevent them π
π Read
via "Security on TechRepublic".
Credential stuffing attacks pose a significant risk to consumers and businesses. Learn how they work and what you can do about them.π Read
via "Security on TechRepublic".
TechRepublic
How credential stuffing attacks work, and how to prevent them
Credential stuffing attacks pose a significant risk to consumers and businesses. Learn how they work and what you can do about them.