π How to stop spam calls right now π
π Read
via "Security on TechRepublic".
Spam calls drive us all crazy. Here are four ways to stop robocalls and other unsolicited phone calls.π Read
via "Security on TechRepublic".
TechRepublic
How to stop spam calls right now
Spam calls drive us all crazy. Here are four ways to stop robocalls and other unsolicited phone calls.
π΄ Intel Issues Fix for 'Plundervolt' SGX Flaw π΄
π Read
via "Dark Reading: ".
Researchers were able to extract AES encryption key using SGX's voltage-tuning function.π Read
via "Dark Reading: ".
Dark Reading
Intel Issues Fix for 'Plundervolt' SGX Flaw
Researchers were able to extract AES encryption key using SGX's voltage-tuning function.
π΄ Trickbot Operators Now Selling Attack Tools to APT Actors π΄
π Read
via "Dark Reading: ".
North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.π Read
via "Dark Reading: ".
Darkreading
Trickbot Operators Now Selling Attack Tools to APT Actors
North Korea's Lazarus Group - of Sony breach and WannaCry fame - is among the first customers.
π TestSSL 3.0rc6 π
π Go!
via "Security Tool Files β Packet Storm".
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
TestSSL 3.0rc6 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Apple iOS 13.3 is here, bringing support for keyfobby authentication β
π Read
via "Naked Security".
Bullet-proof authentication is just a tap away!π Read
via "Naked Security".
Naked Security
Apple iOS 13.3 is here, bringing support for keyfobby authentication
Bullet-proof authentication is just a tap away!
β December Patch Tuesday blunts WizardOpium attack chain β
π Read
via "Naked Security".
December 2019βs Patch Tuesday updates are, including a fix for the Windows flaw used in recently discovered WizardOpium attacks.π Read
via "Naked Security".
Naked Security
December Patch Tuesday blunts WizardOpium attack chain
December 2019βs Patch Tuesday updates are out, including a fix for the Windows flaw used in recently discovered WizardOpium attacks.
β Retail Cyberattacks Set to Soar 20% in 2019 Holiday Season β
π Read
via "Threatpost".
A couple of factors this year are making the 2019 holiday shopping season a circus for cybercriminals when it comes to cyberattacks against retail orgs.π Read
via "Threatpost".
Threat Post
Retail Cyberattacks Set to Soar 20% in 2019 Holiday Season
A couple of factors this year are making the 2019 holiday shopping season a circus for cybercriminals when it comes to cyberattacks against retail orgs.
β Your Smart Christmas Lights Are Safer Than They Were Last Year β
π Read
via "Threatpost".
Manufacturers of the Twinkly IoT-connected lights slightly boosted security by switching out the Wi-Fi module, according to Pen Test Partners.π Read
via "Threatpost".
Threat Post
Your Smart Christmas Lights Are Safer Than They Were Last Year
Manufacturers of the Twinkly IoT-connected lights slightly boosted security by switching out the Wi-Fi module, according to Pen Test Partners.
π΄ Waking Up to Third-Party Security Risk π΄
π Read
via "Dark Reading: ".
You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.π Read
via "Dark Reading: ".
Darkreading
Waking Up to Third-Party Security Risk
You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.
β S2 Ep20: Why donβt they send ransomware on floppies anymore? β
π Read
via "Naked Security".
New episode available now!π Read
via "Naked Security".
Naked Security
S2 Ep20: Why donβt they send ransomware on floppies anymore?
New episode available now!
π Organizations moving toward more rigorous security testing to ensure compliance π
π Read
via "Security on TechRepublic".
More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack.π Read
via "Security on TechRepublic".
TechRepublic
Organizations moving toward more rigorous security testing to ensure compliance
More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack.
π΄ Lessons from the NSA: Know Your Assets π΄
π Read
via "Dark Reading: ".
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.π Read
via "Dark Reading: ".
Dark Reading
Lessons from the NSA: Know Your Assets
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.
π΄ Smart Building Security Awareness Grows π΄
π Read
via "Dark Reading: ".
In 2020, expect to hear more about smart building security.π Read
via "Dark Reading: ".
Dark Reading
Smart Building Security Awareness Grows
In 2020, expect to hear more about smart building security.
β Brexit β even cybercriminals want to have their sayβ¦ β
π Read
via "Naked Security".
These crooks stashed a message in the virus code itelf - we found it, but we don't know which way to take it!π Read
via "Naked Security".
Naked Security
Brexit β even cybercriminals want to have their sayβ¦
These crooks stashed a message in the virus code itelf β we found it, but we donβt know which way to take it!
π΅ i2Coalition creates alliance of major VPN providers to form VPN Trust Initiative π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
i2Coalition connects major VPN providers to form VPN Trust Initiative
NordVPN, ExpressVPN, VyprVPN, and IPVanish have formed the VPN Trust Initiative within i2Coalition. It aims at improving digital security for VPN consumers.
β Maze Ransomware Behind Pensacola Attack, Data Breach Looms β
π Read
via "Threatpost".
Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached. π Read
via "Threatpost".
Threat Post
Maze Ransomware Behind Pensacola Attack, Data Breach Looms
Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached.
β Chrome 79 includes anti-phishing and hacked password protection β
π Read
via "Naked Security".
Version 79 of Chrome is out, and it promises to do a better job of protecting you against phishing sites and credential stuffing attacks.π Read
via "Naked Security".
Naked Security
Chrome 79 includes anti-phishing and hacked password protection
Version 79 of Chrome is out, and it promises to do a better job of protecting you against phishing sites and credential stuffing attacks.
β Facebook refuses to break end-to-end encryption β
π Read
via "Naked Security".
Congress on Tuesday told Facebook it must put backdoors into its end-to-end encryption, or it'll be forced to.π Read
via "Naked Security".
Naked Security
Facebook refuses to break end-to-end encryption
Congress on Tuesday told Facebook it must put backdoors into its end-to-end encryption, or itβll be forced to.
π΄ Thanks, Larry! π΄
π Read
via "Dark Reading: ".
A no-tech trick, a la social engineering, can lead to huge corporate security consequences -- and it might just score the criminal a new car.π Read
via "Dark Reading: ".
Dark Reading
Thanks, Larry!
A no-tech trick, a la social engineering, can lead to huge corporate security consequences -- and it might just score the criminal a new car.
π΄ Get Organized Like a Villain π΄
π Read
via "Dark Reading: ".
What cybercrime group FIN7 can teach us about using agile frameworks.π Read
via "Dark Reading: ".
Darkreading
Get Organized Like a Villain
What cybercrime group FIN7 can teach us about using agile frameworks.
β All in the (Ransomware) Family: 10 Ways to Take Action β
π Read
via "Threatpost".
Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware.π Read
via "Threatpost".
Threat Post
All in the (Ransomware) Family: 10 Ways to Take Action
Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware.