β EFF Talks the Corporate Surveillance of Consumers β
π Read
via "Threatpost".
The EFF explains how data is being tracked and used on the web and mobile devices, how consumers can protect themselves - and why it's not all bad news.π Read
via "Threatpost".
Threat Post
EFF Talks the Corporate Surveillance of Consumers
The EFF explains how data is being tracked and used on the web and mobile devices, how consumers can protect themselves - and why it's not all bad news.
π΄ Application & Infrastructure Risk Management: You've Been Doing It Backward π΄
π Read
via "Dark Reading: ".
Before getting more scanning tools, think about what's needed to defend your organization's environment and devise a plan to ensure all needed tools can work together productively.π Read
via "Dark Reading: ".
Darkreading
Application & Infrastructure Risk Management: You've Been Doing It Backward
Before getting more scanning tools, think about what's needed to defend your organization's environment and devise a plan to ensure all needed tools can work together productively.
π Stay cybersecure when shopping for the holidays π
π Read
via "Security on TechRepublic".
Common sense and a careful backup plan are just a couple of the ways to be prepared for online and traditional dangers during the season.π Read
via "Security on TechRepublic".
TechRepublic
Stay cybersecure when shopping for the holidays
Common sense and a careful backup plan are just a couple of the ways to be prepared for online and traditional dangers during the season.
π΄ Attackers Can Circumvent Outlook Homepage Flaw π΄
π Read
via "Dark Reading: ".
FireEye issues guidance on locking down Outlook, claiming that security researchers, at least, are able to work around the patch issued by Microsoft.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Microsoft Issues Advisory for Windows Hello for Business π΄
π Read
via "Dark Reading: ".
An issue exists in Windows Hello for Business when public keys persist after a device is removed from Active Directory, if the AD exists, Microsoft reports.π Read
via "Dark Reading: ".
Darkreading
Microsoft Issues Advisory for Windows Hello for Business
An issue exists in Windows Hello for Business when public keys persist after a device is removed from Active Directory, if the AD exists, Microsoft reports.
π΄ Attackers Can Circumvent Outlook Homepage Flaw π΄
π Read
via "Dark Reading: ".
FireEye issues guidance on locking down Outlook, claiming that security researchers, at least, are able to work around the patch issued by Microsoft.π Read
via "Dark Reading: ".
Darkreading
Attackers Continue to Exploit Outlook Home Page Flaw
FireEye issues guidance on locking down Outlook, claiming that security researchers, at least, are able to work around the patch issued by Microsoft.
π Top 5 things to know about cyber insurance π
π Read
via "Security on TechRepublic".
With cyberattacks increasing, it's becoming more and more important for companies to protect themselves. Tom Merritt lists five things you should know about cyber insurance.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about cyber insurance
With cyberattacks increasing, it's becoming more and more important for companies to protect themselves. Tom Merritt lists five things you should know about cyber insurance.
π Top 5 things to know about cyber insurance π
π Read
via "Security on TechRepublic".
With cyberattacks increasing, it's becoming more and more important for companies to protect themselves. Tom Merritt lists five things you should know about cyber insurance.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 things to know about cyber insurance
With cyberattacks increasing, it's becoming more and more important for companies to protect themselves. Tom Merritt lists five things you should know about cyber insurance.
π The 10 most important cyberattacks of the decade π
π Read
via "Security on TechRepublic".
After a number of devastating breaches and hacks, the sheer size of data lost is no longer the only indicator of severity.π Read
via "Security on TechRepublic".
TechRepublic
The 10 most important cyberattacks of the decade
After a number of devastating breaches and hacks, the sheer size of data lost is no longer the only indicator of severity.
β Iran Targets Mideast Oil with ZeroCleare Wiper Malware β
π Read
via "Threatpost".
Likely the work of APT34, ZeroCleare is bent on destruction and disruption, rather than information-stealing.π Read
via "Threatpost".
Threat Post
Iran Targets Mideast Oil with ZeroCleare Wiper Malware
Likely the work of APT34, ZeroCleare is bent on destruction and disruption, rather than information-stealing.
β βHighly Competitiveβ Buer Loader Emerges in Underground Markets β
π Read
via "Threatpost".
A previously undocumented loader has been discovered in several recent malware campaigns and being sold on underground markets.π Read
via "Threatpost".
Threat Post
βHighly Competitiveβ Buer Loader Emerges in Underground Markets
A previously-undocumented loader has been discovered in several recent malware campaigns and being sold on underground markets.
π΄ Navigating Security in the Cloud π΄
π Read
via "Dark Reading: ".
Underestimating the security changes that need to accompany a shift to the cloud could be fatal to a business. Here's why.π Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
π With CCPA Looming, Politicians Pitch Last Minute Data Privacy Bills π
π Read
via "Subscriber Blog RSS Feed ".
One privacy bill would override state laws already on the books - like the CCPA - another would only pre-empt laws that conflict with certain provisions.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
With CCPA Looming, Politicians Pitch Last Minute Data Privacy Bills
One privacy bill would override state laws already on the books - like the CCPA - another would only pre-empt laws that conflict with certain provisions.
π΄ The Edge Cartoon Contest: You Better Watch Out ... π΄
π Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading: ".
Dark Reading
The Edge
Feeling creative this holiday season? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
π΄ (Literally) Put a Ring on It: Protecting Biometric Fingerprints π΄
π Read
via "Dark Reading: ".
Kaspersky creates a prototype ring you can wear on your finger for authentication.π Read
via "Dark Reading: ".
Dark Reading
(Literally) Put a Ring on It: Protecting Biometric Fingerprints
Kaspersky creates a prototype ring you can wear on your finger for authentication.
π΄ Black Hat Europe Q&A: Understanding the Ethics of Cybersecurity Journalism π΄
π Read
via "Dark Reading: ".
Investigative journalist Geoff White chats about why now is the right time for his Black Hat Europe Briefing on hackers, journalists, and the ethical ramifications of cybersecurity journalism.π Read
via "Dark Reading: ".
Dark Reading
Black Hat Europe Q&A: Understanding the Ethics of Cybersecurity Journalism
Investigative journalist Geoff White chats about why now is the right time for his Black Hat Europe Briefing on hackers, journalists, and the ethical ramifications of cybersecurity journalism.
π΄ Shades of Shamoon: New Disk-Wiping Malware Targets Middle East Orgs π΄
π Read
via "Dark Reading: ".
'ZeroCleare' shares some of the same features as its more notorious predecessor, IBM Security says.π Read
via "Dark Reading: ".
Darkreading
Shades of Shamoon: New Disk-Wiping Malware Targets Middle East Orgs
'ZeroCleare' shares some of the same features as its more notorious predecessor, IBM Security says.
β Nebraska Medicine Breached By Rogue Employee β
π Read
via "Threatpost".
Nebraska Medicine is warning that a rogue, former employee accessed patients' medical records, Social Security numbers and more.π Read
via "Threatpost".
Threat Post
Nebraska Medicine Breached By Rogue Employee
Nebraska Medicine is warning that a rogue, former employee accessed patients' medical records, Social Security numbers and more.
π΄ What's in a Botnet? Researchers Spy on Geost Operators π΄
π Read
via "Dark Reading: ".
The investigation of a major Android banking botnet yields insights about how cybercriminals structure and run an illicit business.π Read
via "Dark Reading: ".
Darkreading
What's in a Botnet? Researchers Spy on Geost Operators
The investigation of a major Android banking botnet yields insights about how cybercriminals structure and run an illicit business.
β ThreatList: 1 in 9 SMBs Believe Nation-State Actors Are Targeting Them β
π Read
via "Threatpost".
Larger SMBs are more likely to feel targeted by APTs.π Read
via "Threatpost".
Threat Post
ThreatList: 90% of SMBs Believe Nation-State Actors Are Targeting Them
Larger SMBs are more likely to feel targeted by APTs.
π΄ Password-Cracking Teams Up in CrackQ Release π΄
π Read
via "Dark Reading: ".
The open source platform aims to make password-cracking more manageable and efficient for red teams.π Read
via "Dark Reading: ".
Dark Reading
Password-Cracking Teams Up in CrackQ Release
The open source platform aims to make password-cracking more manageable and efficient for red teams.