π΄ Lessons from the NSA: Know Your Assets π΄
π Read
via "Dark Reading: ".
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.π Read
via "Dark Reading: ".
Dark Reading
Lessons from the NSA: Know Your Assets
Chris Kubic worked at the National Security Agency for the past 32 years, finishing his tenure as CISO. He talks about lessons learned during his time there and what they mean for the private sector.
π΄ Smart Building Security Awareness Grows π΄
π Read
via "Dark Reading: ".
In 2020, expect to hear more about smart building security.π Read
via "Dark Reading: ".
Dark Reading
Smart Building Security Awareness Grows
In 2020, expect to hear more about smart building security.
β Brexit β even cybercriminals want to have their sayβ¦ β
π Read
via "Naked Security".
These crooks stashed a message in the virus code itelf - we found it, but we don't know which way to take it!π Read
via "Naked Security".
Naked Security
Brexit β even cybercriminals want to have their sayβ¦
These crooks stashed a message in the virus code itelf β we found it, but we donβt know which way to take it!
π΅ i2Coalition creates alliance of major VPN providers to form VPN Trust Initiative π΅
π Read
via "VPNpro".
π Read
via "VPNpro".
VPNpro
i2Coalition connects major VPN providers to form VPN Trust Initiative
NordVPN, ExpressVPN, VyprVPN, and IPVanish have formed the VPN Trust Initiative within i2Coalition. It aims at improving digital security for VPN consumers.
β Maze Ransomware Behind Pensacola Attack, Data Breach Looms β
π Read
via "Threatpost".
Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached. π Read
via "Threatpost".
Threat Post
Maze Ransomware Behind Pensacola Attack, Data Breach Looms
Maze exfiltrates data as well as locks down systems. Officials said they don't know yet whether any residents' personal information has been breached.
β Chrome 79 includes anti-phishing and hacked password protection β
π Read
via "Naked Security".
Version 79 of Chrome is out, and it promises to do a better job of protecting you against phishing sites and credential stuffing attacks.π Read
via "Naked Security".
Naked Security
Chrome 79 includes anti-phishing and hacked password protection
Version 79 of Chrome is out, and it promises to do a better job of protecting you against phishing sites and credential stuffing attacks.
β Facebook refuses to break end-to-end encryption β
π Read
via "Naked Security".
Congress on Tuesday told Facebook it must put backdoors into its end-to-end encryption, or it'll be forced to.π Read
via "Naked Security".
Naked Security
Facebook refuses to break end-to-end encryption
Congress on Tuesday told Facebook it must put backdoors into its end-to-end encryption, or itβll be forced to.
π΄ Thanks, Larry! π΄
π Read
via "Dark Reading: ".
A no-tech trick, a la social engineering, can lead to huge corporate security consequences -- and it might just score the criminal a new car.π Read
via "Dark Reading: ".
Dark Reading
Thanks, Larry!
A no-tech trick, a la social engineering, can lead to huge corporate security consequences -- and it might just score the criminal a new car.
π΄ Get Organized Like a Villain π΄
π Read
via "Dark Reading: ".
What cybercrime group FIN7 can teach us about using agile frameworks.π Read
via "Dark Reading: ".
Darkreading
Get Organized Like a Villain
What cybercrime group FIN7 can teach us about using agile frameworks.
β All in the (Ransomware) Family: 10 Ways to Take Action β
π Read
via "Threatpost".
Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware.π Read
via "Threatpost".
Threat Post
All in the (Ransomware) Family: 10 Ways to Take Action
Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware.
π Why Behavioral Analysis Should Play a Role in Data Protection Programs π
π Read
via "Subscriber Blog RSS Feed ".
Ignoring the value in behavioral analytics could leave your data vulnerable to attack. We asked 18 security experts why behavioral analysis should factor into your data protection program.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Why Behavioral Analysis Should Play a Role in Data Protection Programs
Ignoring the value in behavioral analytics could leave your data vulnerable to attack. We asked 18 security experts why behavioral analysis should factor into your data protection program.
π΄ Gallium: The Newest Threat Group on Microsoft's Radar π΄
π Read
via "Dark Reading: ".
Hacking group has been targeting telecommunication providers.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ The Most, Least Insecure US Cities for SMBs π΄
π Read
via "Dark Reading: ".
A new report looks at computer activity in the 50 largest metropolitan areas.π Read
via "Dark Reading: ".
Dark Reading
The Most, Least Insecure US Cities for SMBs
A new report looks at computer activity in the 50 largest metropolitan areas.
β Critical Remote Code-Execution Bugs Threaten Global Power Plants β
π Read
via "Threatpost".
Seventeen bugs could be exploited to stop electrical generation and cause malfunctions at power plants.π Read
via "Threatpost".
Threat Post
Critical Remote Code-Execution Bugs Threaten Global Power Plants
Seventeen bugs could be exploited to stop electrical generation and cause malfunctions at power plants.
π΄ Cyberattacks on Retailers Could Increase 20% this Holiday Season π΄
π Read
via "Dark Reading: ".
Commodity malware and ransomware continue to be the biggest threats, says VMWare Carbon Black.π Read
via "Dark Reading: ".
Darkreading
Cyberattacks on Retailers Could Increase 20% this Holiday Season
Commodity malware and ransomware continue to be the biggest threats, says VMWare Carbon Black.
π How to use Firefox's Lockwise password manager π
π Read
via "Security on TechRepublic".
Mozilla has evolved its Lockbox password tool into a more standard password manager. Jack Wallen shows you how to use the Firefox Lockwise password manager.π Read
via "Security on TechRepublic".
TechRepublic
How to use the Firefox Lockwise password manager
Mozilla has evolved its Lockbox password tool into a more standard password manager. Find out if Firefox Lockwise is right for you.
π΄ Android App Analysis Uncovers Seasonal Shopping Risk π΄
π Read
via "Dark Reading: ".
Researchers scanned 4,200 Android apps and found many exhibit malicious behavior or have a dangerous level of permissions.π Read
via "Dark Reading: ".
Dark Reading
Android App Analysis Uncovers Seasonal Shopping Risk
Researchers scanned 4,200 Android apps and found many exhibit malicious behavior or have a dangerous level of permissions.
β Weak account checks earn company $10.5 million privacy fine β
π Read
via "Naked Security".
The telecomms company violates the EU's GDPR by allegedly failing to fully authenticate people phoning up to access their accounts.π Read
via "Naked Security".
Naked Security
Weak account checks earn company $10.5 million privacy fine
The telecomms company violates the EUβs GDPR by allegedly failing to fully authenticate people phoning up to access their accounts.
β Jack Dorsey wants a decentralised Twitter β
π Read
via "Naked Security".
Twitter CEO Jack Dorsey has announced a research effort to explore a decentralised version of the microblogging platform.π Read
via "Naked Security".
Naked Security
Jack Dorsey wants a decentralised Twitter
Twitter CEO Jack Dorsey has announced a research effort to explore a decentralised version of the microblogging platform.
β YouTube bans malicious insults, veiled threats, harassment β
π Read
via "Naked Security".
The new policy addresses how coordinated online abuse often happens in real life: poisonous drips spanning multiple videos/comments.π Read
via "Naked Security".
Naked Security
YouTube bans malicious insults, veiled threats, harassment
The new policy addresses how coordinated online abuse often happens in real life: poisonous drips spanning multiple videos/comments.
β Facebook will target ads based on your Oculus VR data β
π Read
via "Naked Security".
If you're logged into Facebook, it will suck up information such as which apps you use to provide "relevant content, including ads.βπ Read
via "Naked Security".
Naked Security
Facebook will target ads based on your Oculus VR data
If youβre logged into Facebook, it will suck up information such as which apps you use to provide βrelevant content, including ads.β