β YouTube bans malicious insults, veiled threats, harassment β
π Read
via "Naked Security".
The new policy addresses how coordinated online abuse often happens in real life: poisonous drips spanning multiple videos/comments.π Read
via "Naked Security".
Naked Security
YouTube bans malicious insults, veiled threats, harassment
The new policy addresses how coordinated online abuse often happens in real life: poisonous drips spanning multiple videos/comments.
β Facebook will target ads based on your Oculus VR data β
π Read
via "Naked Security".
If you're logged into Facebook, it will suck up information such as which apps you use to provide "relevant content, including ads.βπ Read
via "Naked Security".
Naked Security
Facebook will target ads based on your Oculus VR data
If youβre logged into Facebook, it will suck up information such as which apps you use to provide βrelevant content, including ads.β
π΄ Lessons Learned from 7 Big Breaches in 2019 π΄
π Read
via "Dark Reading: ".
Capital One, Macy's, FEMA, and others: key takeaways from the year's most notable breaches.π Read
via "Dark Reading: ".
Darkreading
Lessons Learned from 7 Big Breaches in 2019
Capital One, Macy's, FEMA, and others: key takeaways from the year's most notable breaches.
β FIN8 Targets Card Data at Fuel Pumps β
π Read
via "Threatpost".
Paying at the pump has landed in the sights of the notorious PoS-skimming group.π Read
via "Threatpost".
Threat Post
FIN8 Targets Card Data at Fuel Pumps
Paying at the pump has landed in the sights of the notorious PoS-skimming group.
π΄ Endpoint Protection: Dark Reading Caption Contest Winners π΄
π Read
via "Dark Reading: ".
Trojans, knights, and medieval wordplay. And the winners are ...π Read
via "Dark Reading: ".
Dark Reading
Endpoint Protection: Dark Reading Caption Contest Winners
Trojans, knights, and medieval wordplay. And the winners are ...
π Suricata IDPE 5.0.1 π
π Go!
via "Security Tool Files β Packet Storm".
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Suricata IDPE 5.0.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Friday Five: 12/13 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Ransomware hits 100+ dentists' offices, the U.K. warns charities about a new internet fraud campaign, and more - catch up on all the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 12/13 Edition
Ransomware hits 100+ dentists' offices, the U.K. warns charities about a new internet fraud campaign, and more - catch up on all the week's news with the Friday Five.
π΄ Fortinet Buys CyberSponse for SOAR Capabilities π΄
π Read
via "Dark Reading: ".
It plans to integrate CyberSponse's SOAR platform into the Fortinet Security Fabric.π Read
via "Dark Reading: ".
Dark Reading
Fortinet Buys CyberSponse for SOAR Capabilities
It plans to integrate CyberSponse's SOAR platform into the Fortinet Security Fabric.
π΄ 'Motivating People Who Want the Struggle': Expert Advice on InfoSec Leadership π΄
π Read
via "Dark Reading: ".
Industry veteran and former Intel security chief Malcolm Harkins pinpoints three essential elements for leaders to connect with their employees and drive business objectives.π Read
via "Dark Reading: ".
Dark Reading
'Motivating People Who Want the Struggle': Expert Advice on InfoSec Leadership
Industry veteran and former Intel security chief Malcolm Harkins pinpoints three essential elements for leaders to connect with their employees and drive business objectives.
β Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers β
π Read
via "Threatpost".
One flaw found in WordPress plugins Ultimate Addons for Beaver Builder and Ultimate Addons for Elementor is actively being exploited.π Read
via "Threatpost".
Threat Post
Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers
One flaw found in WordPress plugins Ultimate Addons for Beaver Builder and Ultimate Addons for Elementor is actively being exploited.
β Elegant sLoad Carries Out Spying, Payload Delivery in BITS β
π Read
via "Threatpost".
The BITS file-transfer component of Windows as a key piece of sLoad's attack methodology.π Read
via "Threatpost".
Threat Post
Elegant sLoad Carries Out Spying, Payload Delivery in BITS
The BITS file-transfer component of Windows as a key piece of sLoad's attack methodology.
β Pairing Privacy and Security with Digital Identities in Retail β
π Read
via "Threatpost".
Omnichannel views of customers are a competitive edge -- but they have to be appropriately implemented.π Read
via "Threatpost".
Threat Post
Pairing Privacy and Security with Digital Identities in Retail
Omnichannel views of customers are a competitive edge β but they have to be appropriately implemented.
π΄ Visa Warns of Targeted PoS Attacks on Gas Station Merchants π΄
π Read
via "Dark Reading: ".
At least two North American chains have been hit in sophisticated new campaigns for stealing payment card data.π Read
via "Dark Reading: ".
Darkreading
Visa Warns of Targeted PoS Attacks on Gas Station Merchants
At least two North American chains have been hit in sophisticated new campaigns for stealing payment card data.
β GitLab Doles Out Half a Million Bucks to White Hats β
π Read
via "Threatpost".
The DevOps lifecycle management said that response to its year-old bug-bounty program has been robust.π Read
via "Threatpost".
Threat Post
GitLab Doles Out Half a Million Bucks to White Hats
The DevOps lifecycle management said that response to its year-old bug-bounty program has been robust.
π 10 cybersecurity stories in 2019 that make us feel less secure π
π Read
via "Security on TechRepublic".
Jack Wallen runs through 10 of the most important cybersecurity threats, breaches, tools, and news of the year.π Read
via "Security on TechRepublic".
β Monday review β the hot 24 stories of the week β
π Read
via "Naked Security".
From Snatch ransomware's safe-mode reboot to Facebook's view on end-to-end encryption - and everything in between. It's roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 24 stories of the week
From Snatch ransomwareβs safe-mode reboot to Facebookβs view on end-to-end encryption β and everything in between. Itβs roundup time.
β Emotion-detection in AI should be regulated, AI Now says β
π Read
via "Naked Security".
It's built on junk science, yet it's being used to determine who gets hired, fired, insured, medicated and more, the research institute says.π Read
via "Naked Security".
Naked Security
Emotion-detection in AI should be regulated, AI Now says
Itβs built on junk science, yet itβs being used to determine who gets hired, fired, insured, medicated and more, the research institute says.
β Google adds Verified SMS and anti-spam feature to Messages app β
π Read
via "Naked Security".
If webmail, WhatsApp and IM are killing SMS, someone might want to tell Google - as it continues to add new features to its Messages app.π Read
via "Naked Security".
Naked Security
Google adds Verified SMS and anti-spam feature to Messages app
If webmail, WhatsApp and IM are killing SMS, someone might want to tell Google β as it continues to add new features to its Messages app.
β Npm patches two serious bugs β
π Read
via "Naked Security".
JavaScript package users have been warned to update due to a bug that could enable an attacker to infect them with malicious applications.π Read
via "Naked Security".
Naked Security
Npm patches two serious bugs
JavaScript package users have been warned to update due to a bug that could enable an attacker to infect them with malicious applications.
β Police get βunprecedentedβ data haul from Google with geofence warrants β
π Read
via "Naked Security".
Investigators are using geofence warrants to get anybody and everybody who's near a crime at a given time.π Read
via "Naked Security".
Naked Security
Police get βunprecedentedβ data haul from Google with geofence warrants
Investigators are using geofence warrants to get anybody and everybody whoβs near a crime at a given time.
β Plundervolt β stealing secrets by starving your computer of voltage β
π Read
via "Naked Security".
Turns out that if you drop your CPU voltage just enough, it makes mistakes that could let you sneak in where you shouldn't.π Read
via "Naked Security".
Naked Security
Plundervolt β stealing secrets by starving your computer of voltage
Turns out that if you drop your CPU voltage just enough, it makes mistakes that could let you sneak in where you shouldnβt.