β Retail Cyberattacks Set to Soar 20% in 2019 Holiday Season β
π Read
via "Threatpost".
A couple of factors this year are making the 2019 holiday shopping season a circus for cybercriminals when it comes to cyberattacks against retail orgs.π Read
via "Threatpost".
Threat Post
Retail Cyberattacks Set to Soar 20% in 2019 Holiday Season
A couple of factors this year are making the 2019 holiday shopping season a circus for cybercriminals when it comes to cyberattacks against retail orgs.
β Your Smart Christmas Lights Are Safer Than They Were Last Year β
π Read
via "Threatpost".
Manufacturers of the Twinkly IoT-connected lights slightly boosted security by switching out the Wi-Fi module, according to Pen Test Partners.π Read
via "Threatpost".
Threat Post
Your Smart Christmas Lights Are Safer Than They Were Last Year
Manufacturers of the Twinkly IoT-connected lights slightly boosted security by switching out the Wi-Fi module, according to Pen Test Partners.
π΄ Waking Up to Third-Party Security Risk π΄
π Read
via "Dark Reading: ".
You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.π Read
via "Dark Reading: ".
Darkreading
Waking Up to Third-Party Security Risk
You can't rely on the words, intentions, or security measures of others to guard your company, customer and brand.
β S2 Ep20: Why donβt they send ransomware on floppies anymore? β
π Read
via "Naked Security".
New episode available now!π Read
via "Naked Security".
Naked Security
S2 Ep20: Why donβt they send ransomware on floppies anymore?
New episode available now!
π Organizations moving toward more rigorous security testing to ensure compliance π
π Read
via "Security on TechRepublic".
More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack.π Read
via "Security on TechRepublic".
TechRepublic
Organizations moving toward more rigorous security testing to ensure compliance
More companies are using third-party vendors and crowdsourced testing to meet their security needs, according to a new survey from Synack.
π΄ Lessons from the NSA: Know Your Assets π΄
π Read
via "Dark Reading: ".
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.π Read
via "Dark Reading: ".
Dark Reading
Lessons from the NSA: Know Your Assets
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.
π΄ Smart Building Security Awareness Grows π΄
π Read
via "Dark Reading: ".
In 2020, expect to hear more about smart building security.π Read
via "Dark Reading: ".
Dark Reading
Smart Building Security Awareness Grows
In 2020, expect to hear more about smart building security.
β Brexit β even cybercriminals want to have their sayβ¦ β
π Read
via "Naked Security".
These crooks stashed a message in the virus code itelf - we found it, but we don't know which way to take it!π Read
via "Naked Security".
Naked Security
Brexit β even cybercriminals want to have their sayβ¦
These crooks stashed a message in the virus code itelf β we found it, but we donβt know which way to take it!
π΅ i2Coalition creates alliance of major VPN providers to form VPN Trust Initiative π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
i2Coalition connects major VPN providers to form VPN Trust Initiative
NordVPN, ExpressVPN, VyprVPN, and IPVanish have formed the VPN Trust Initiative within i2Coalition. It aims at improving digital security for VPN consumers.
β Maze Ransomware Behind Pensacola Attack, Data Breach Looms β
π Read
via "Threatpost".
Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached. π Read
via "Threatpost".
Threat Post
Maze Ransomware Behind Pensacola Attack, Data Breach Looms
Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached.
β Chrome 79 includes anti-phishing and hacked password protection β
π Read
via "Naked Security".
Version 79 of Chrome is out, and it promises to do a better job of protecting you against phishing sites and credential stuffing attacks.π Read
via "Naked Security".
Naked Security
Chrome 79 includes anti-phishing and hacked password protection
Version 79 of Chrome is out, and it promises to do a better job of protecting you against phishing sites and credential stuffing attacks.
β Facebook refuses to break end-to-end encryption β
π Read
via "Naked Security".
Congress on Tuesday told Facebook it must put backdoors into its end-to-end encryption, or it'll be forced to.π Read
via "Naked Security".
Naked Security
Facebook refuses to break end-to-end encryption
Congress on Tuesday told Facebook it must put backdoors into its end-to-end encryption, or itβll be forced to.
π΄ Thanks, Larry! π΄
π Read
via "Dark Reading: ".
A no-tech trick, a la social engineering, can lead to huge corporate security consequences -- and it might just score the criminal a new car.π Read
via "Dark Reading: ".
Dark Reading
Thanks, Larry!
A no-tech trick, a la social engineering, can lead to huge corporate security consequences -- and it might just score the criminal a new car.
π΄ Get Organized Like a Villain π΄
π Read
via "Dark Reading: ".
What cybercrime group FIN7 can teach us about using agile frameworks.π Read
via "Dark Reading: ".
Darkreading
Get Organized Like a Villain
What cybercrime group FIN7 can teach us about using agile frameworks.
β All in the (Ransomware) Family: 10 Ways to Take Action β
π Read
via "Threatpost".
Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware.π Read
via "Threatpost".
Threat Post
All in the (Ransomware) Family: 10 Ways to Take Action
Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware.
π Why Behavioral Analysis Should Play a Role in Data Protection Programs π
π Read
via "Subscriber Blog RSS Feed ".
Ignoring the value in behavioral analytics could leave your data vulnerable to attack. We asked 18 security experts why behavioral analysis should factor into your data protection program.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Why Behavioral Analysis Should Play a Role in Data Protection Programs
Ignoring the value in behavioral analytics could leave your data vulnerable to attack. We asked 18 security experts why behavioral analysis should factor into your data protection program.
π΄ Gallium: The Newest Threat Group on Microsoft's Radar π΄
π Read
via "Dark Reading: ".
Hacking group has been targeting telecommunication providers.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ The Most, Least Insecure US Cities for SMBs π΄
π Read
via "Dark Reading: ".
A new report looks at computer activity in the 50 largest metropolitan areas.π Read
via "Dark Reading: ".
Dark Reading
The Most, Least Insecure US Cities for SMBs
A new report looks at computer activity in the 50 largest metropolitan areas.
β Critical Remote Code-Execution Bugs Threaten Global Power Plants β
π Read
via "Threatpost".
Seventeen bugs could be exploited to stop electrical generation and cause malfunctions at power plants.π Read
via "Threatpost".
Threat Post
Critical Remote Code-Execution Bugs Threaten Global Power Plants
Seventeen bugs could be exploited to stop electrical generation and cause malfunctions at power plants.
π΄ Cyberattacks on Retailers Could Increase 20% this Holiday Season π΄
π Read
via "Dark Reading: ".
Commodity malware and ransomware continue to be the biggest threats, says VMWare Carbon Black.π Read
via "Dark Reading: ".
Darkreading
Cyberattacks on Retailers Could Increase 20% this Holiday Season
Commodity malware and ransomware continue to be the biggest threats, says VMWare Carbon Black.
π How to use Firefox's Lockwise password manager π
π Read
via "Security on TechRepublic".
Mozilla has evolved its Lockbox password tool into a more standard password manager. Jack Wallen shows you how to use the Firefox Lockwise password manager.π Read
via "Security on TechRepublic".
TechRepublic
How to use the Firefox Lockwise password manager
Mozilla has evolved its Lockbox password tool into a more standard password manager. Find out if Firefox Lockwise is right for you.