β Stay safe on Black Friday β and the rest of the year, too! β
π Read
via "Naked Security".
Watch our latest Naked Security Live video for some handy and practical cybersecurity tips - for Black Friday and beyond.π Read
via "Naked Security".
Naked Security
Stay safe on Black Friday β and the rest of the year, too!
Watch our latest Naked Security Live video for some handy and practical cybersecurity tips β for Black Friday and beyond.
β Master Go player retires citing AI supremacy β
π Read
via "Naked Security".
Master Go player Lee Se-dol has handed in his stones after deciding that there's just no way to beat a machine when playing the ancient Chinese board game.π Read
via "Naked Security".
Naked Security
Master Go player retires citing AI supremacy
Master Go player Lee Se-dol has handed in his stones after deciding that thereβs just no way to beat a machine when playing the ancient Chinese board game.
β Pressure mounts for federal privacy law with second bill β
π Read
via "Naked Security".
Pressure is gathering for a federal privacy law in the US with the introduction of a second bill that would protect consumer data.π Read
via "Naked Security".
Naked Security
Pressure mounts for federal privacy law with second bill
Pressure is gathering for a federal privacy law in the US with the introduction of a second bill that would protect consumer data.
β Adobeβs Magento Marketplace suffers data breach β
π Read
via "Naked Security".
Adobeβs Magento Marketplace has suffered a data breach, the company has said in an email sent to customers.π Read
via "Naked Security".
Naked Security
Adobeβs Magento Marketplace suffers data breach
Adobeβs Magento Marketplace has suffered a data breach, the company has said in an email sent to customers.
β US tightens rules on drone use in policy update β
π Read
via "Naked Security".
When it comes to managing drones (Unmanned Aircraft Systems, or UAS) the US Department of Justice wants Americans to know itβs on the case.π Read
via "Naked Security".
Naked Security
US tightens rules on drone use in policy update
When it comes to managing drones (Unmanned Aircraft Systems, or UAS) the US Department of Justice wants Americans to know itβs on the case.
β Amazon Plans Ring Facial Recognition-Based βWatch List:β Report β
π Read
via "Threatpost".
Amazon's facial recognition would alert Ring users if "suspicious" individuals are near their house.π Read
via "Threatpost".
Threat Post
Amazon Plans Ring Facial Recognition-Based βWatch Listβ, Report
Amazon's facial recognition would alert Ring users if "suspicious" individuals are near their house.
β Netflix account freeze β donβt click, itβs a scam! β
π Read
via "Naked Security".
The telltale signs are all there... but if you're in a hurry, this Netflix scam passes the "visual appeal" test.π Read
via "Naked Security".
Naked Security
Netflix account freeze β donβt click, itβs a scam!
The telltale signs are all thereβ¦ but if youβre in a hurry, this Netflix scam passes the βvisual appealβ test.
π How credential stuffing attacks work, and how to prevent them π
π Read
via "Security on TechRepublic".
Credential stuffing attacks pose a significant risk to consumers and businesses. Learn how they work and what you can do about them.π Read
via "Security on TechRepublic".
TechRepublic
How credential stuffing attacks work, and how to prevent them
Credential stuffing attacks pose a significant risk to consumers and businesses. Learn how they work and what you can do about them.
β Monday review β the hot 25 stories of the week β
π Read
via "Naked Security".
From a warning from Hewlett Packard Enterprise to Russia's foreign tech anxieties. Get up to date with the top infosec stories of last week.π Read
via "Naked Security".
Naked Security
Monday review β the hot 25 stories of the week
From a warning from Hewlett Packard Enterprise to Russiaβs foreign tech anxieties. Get up to date with the top infosec stories of last week.
β TikTok owner to separate company over US national security worries β
π Read
via "Naked Security".
Chinese-owned video-sharing app TikTok might be under fire from US politicians but itβs not going to go down without a fight.π Read
via "Naked Security".
Naked Security
TikTok owner to separate company over US national security worries
Chinese-owned video-sharing app TikTok might be under fire from US politicians but itβs not going to go down without a fight.
β Convicted murderer wins βright to be forgottenβ case β
π Read
via "Naked Security".
Google must remove details of a convicted murderer from its search results in Europe following a German court ruling, it emerged last week.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Uncle Sam opens arms to friendly hackers β
π Read
via "Naked Security".
All you bug hunters out there are about to get a nice Christmas gift - the US federal government finally wants to hear from you.π Read
via "Naked Security".
Naked Security
Uncle Sam opens arms to friendly hackers
All you bug hunters out there are about to get a nice Christmas gift β the US federal government finally wants to hear from you.
β Fake Android apps uploaded to Play store by notorious Sandworm hackers β
π Read
via "Naked Security".
The Russian βSandwormβ hacking group has been caught repeatedly uploading fake and modified Android apps to Googleβs Play Store.π Read
via "Naked Security".
Naked Security
Fake Android apps uploaded to Play store by notorious Sandworm hackers
The Russian βSandwormβ hacking group has been caught repeatedly uploading fake and modified Android apps to Googleβs Play Store.
β Insecure Database Exposes Millions of Private SMS Messages β
π Read
via "Threatpost".
Researchers discovered an unprotected TrueDialog database hosted by Microsoft Azure with diverse and business-related data from tens of millions of users.π Read
via "Threatpost".
Threat Post
Insecure Database Exposes Millions of Private SMS Messages
Researchers discovered an unprotected TrueDialog database hosted by Microsoft Azure with diverse and business-related data from tens of millions of users.
π΄ 3 Modern Myths of Threat Intelligence π΄
π Read
via "Dark Reading: ".
More intelligence does not lead to more security. Here's why.π Read
via "Dark Reading: ".
Darkreading
3 Modern Myths of Threat Intelligence
More intelligence does not lead to more security. Here's why.
β Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds Warn β
π Read
via "Threatpost".
TV takeover, privacy threats, botnet concerns and Wi-Fi network compromise are all big concerns when it comes to connected TVs.π Read
via "Threatpost".
Threat Post
Smart TVs: The Cyberthreat Lurking in Your Living Room, Feds Warn
TV takeover, privacy threats, botnet concerns and Wi-Fi network compromise are all big concerns when it comes to connected TVs.
π΄ New: State of the Internet: Web Attacks and Gaming Abuse π΄
π Read
via "Dark Reading: ".
Attackers see credential abuse as a low-risk venture with potential for a high payout, at least for now.π Read
via "Dark Reading: ".
Dark Reading
New: State of the Internet: Web Attacks and Gaming Abuse
Attackers see credential abuse as a low-risk venture with potential for a high payout, at least for now.
β CISA Pushing U.S. Agencies to Adopt Vulnerability Disclosure Policies β
π Read
via "Threatpost".
A newly proposed CISA directive would require all U.S. agencies to develop and implement vulnerability disclosure processes for their internet connected systems.π Read
via "Threatpost".
Threat Post
CISA Pushing U.S. Agencies to Adopt Vulnerability Disclosure Policies
A newly proposed CISA directive would require all U.S. agencies to develop and implement vulnerability disclosure processes for their internet connected systems.
π SafeBreach catches 3 major vulnerabilities with Trend Micro, Autodesk and Kaspersky π
π Read
via "Security on TechRepublic".
The issues have been patched or solved but researchers say they represent a worrying step in how attackers can manipulate trusted security systems.π Read
via "Security on TechRepublic".
TechRepublic
SafeBreach catches 3 major vulnerabilities with Trend Micro, Autodesk and Kaspersky
The issues have been patched or solved but researchers say they represent a worrying step in how attackers can manipulate trusted security systems.
π Synack's Trust Report uses Attacker Resistance Score to rate cybersecurity defenses π
π Read
via "Security on TechRepublic".
Manufacturers and utilities rank highest while e-commerce companies come in last.π Read
via "Security on TechRepublic".
TechRepublic
Synack's Trust Report uses Attacker Resistance Score to rate cybersecurity defenses
Manufacturers and utilities rank highest while e-commerce companies come in last.
π Report: APT gang increased cyberattacks on businesses in Q3 π
π Read
via "Security on TechRepublic".
Hackers used email addresses, malicious Word docs, and compromised SharePoint sites to deliver malware.π Read
via "Security on TechRepublic".
TechRepublic
Report: APT gang increased cyberattacks on businesses in Q3
Hackers used email addresses, malicious Word docs, and compromised SharePoint sites to deliver malware.