β Epilepsy Foundation Bombarded with Seizure-Triggering Twitter Posts β
π Read
via "Threatpost".
The Epilepsy Foundation has filed a criminal complaint against undisclosed Twitter users who users its Twitter feed to post seizure-inducing content.π Read
via "Threatpost".
Threat Post
Epilepsy Foundation Bombarded with Seizure-Triggering Twitter Posts
The Epilepsy Foundation has filed a criminal complaint against undisclosed Twitter users who users its Twitter feed to post seizure-inducing content.
ATENTIONβΌ New - CVE-2013-0202
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in ownCloud 4.5.5, 4.0.10, and earlier allows remote attackers to inject arbitrary web script or HTML via the action parameter to core/ajax/sharing.php.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-2237
π Read
via "National Vulnerability Database".
Multiple cross-site scripting (XSS) vulnerabilities in Mahara 1.4.x before 1.4.3 and 1.5.x before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) javascript innerHTML as used when generating login forms, (2) links or (3) resources URLs, and (4) the Display name in a user profile.π Read
via "National Vulnerability Database".
π Ten Steps to Stop Intellectual Property Theft π
π Read
via "Subscriber Blog RSS Feed ".
For every manufacturing firm, sensitive data is the most valuable asset. If this critical information β in particular, intellectual property (IP) β is ever lost or stolen, manufacturers not only face significant fines and penalties but also suffer a hit to their reputations and public trust. Perhaps most importantly, they risk losing their competitive advantage, which can ultimately lead to business failure and bankruptcy.π Read
via "Subscriber Blog RSS Feed ".
β Rooster Teeth Attack Showcases New Magecart Approach β
π Read
via "Threatpost".
The streaming video and podcast content company was hit by a payment-card attack.π Read
via "Threatpost".
Threat Post
Rooster Teeth Attack Showcases New Magecart Approach
The streaming video and podcast content company was hit by a payment-card attack.
π Survey: Customers want integration and strategic support from security vendors π
π Read
via "Security on TechRepublic".
Vendors get low marks for customer support and committing to benchmarks.π Read
via "Security on TechRepublic".
TechRepublic
Survey: Customers want integration and strategic support from security vendors
Vendors get low marks for customer support and committing to benchmarks.
π΄ Higher Degree, Higher Salary? Not for Some Security Pros π΄
π Read
via "Dark Reading: ".
Turns out, skill beats experience and an academic degree doesn't guarantee higher compensation for five security positions.π Read
via "Dark Reading: ".
Dark Reading
Higher Degree, Higher Salary? Not for Some Security Pros
Turns out, skill beats experience and an academic degree doesn't guarantee higher compensation for five security positions.
π΄ Facebook Fixes WhatsApp Group Chat Security Issue π΄
π Read
via "Dark Reading: ".
Flaw allowed attackers to repeatedly crash group chat and force users to uninstall and reinstall app, Check Point says.π Read
via "Dark Reading: ".
Darkreading
Facebook Fixes WhatsApp Group Chat Security Issue
Flaw allowed attackers to repeatedly crash group chat and force users to uninstall and reinstall app, Check Point says.
π΄ 15 Million Patient Records Exposed Attack on Canadian Lab π΄
π Read
via "Dark Reading: ".
A cyberattack against LifeLabs exposed personal information on patients in Ontario and British Columbia.π Read
via "Dark Reading: ".
Darkreading
15 Million Patient Records Exposed Attack on Canadian Lab
A cyberattack against LifeLabs exposed personal information on patients in Ontario and British Columbia.
β Donβt fall for this porn scam β even if your passwordβs in the subject! β
π Read
via "Naked Security".
This "I am well aware" email is just another sextortion scam where crooks try to blackmail you with a video they don't actually have.π Read
via "Naked Security".
Naked Security
Donβt fall for this porn scam β even if your passwordβs in the subject!
This βI am well awareβ email is just another sextortion scam where crooks try to blackmail you with a video they donβt actually have.
π1
π΄ How to Manage API Security π΄
π Read
via "Dark Reading: ".
Protecting the places where application services meet is critical for protecting enterprise IT. Here's what security pros need to know about "the invisible glue" that keeps apps talking to each other.π Read
via "Dark Reading: ".
Dark Reading
How to Manage API Security
Protecting the places where application services meet is critical for protecting enterprise IT. Here's what security pros need to know about the invisible glue that keeps apps talking to each other.
β Google to choke off βless secure applicationsβ β
π Read
via "Naked Security".
If you're entering a username and password to give an app access to a G Suite account, beware: you won't be able to do it for much longer.π Read
via "Naked Security".
Naked Security
Google to choke off βless secure applicationsβ
If youβre entering a username and password to give an app access to a G Suite account, beware: you wonβt be able to do it for much longer.
β Alleged bank vault robber posed with cash on Instagram, Facebook β
π Read
via "Naked Security".
He allegedly stole over $88,000 from Wells Fargo's vault, then posed with cash and "his" Mercedes-Benz in posts and an Instagram rap.π Read
via "Naked Security".
Naked Security
Alleged bank vault robber posed with cash on Instagram, Facebook
He allegedly stole over $88,000 from Wells Fargoβs vault, then posed with cash and βhisβ Mercedes-Benz in posts and an Instagram rap.
β Mozilla adds NextDNS to list of DNS-over-HTTPS providers β
π Read
via "Naked Security".
Firefox users interested in turning on the browserβs DNS-over-HTTPS (DoH) privacy feature now have two providers to choose from.π Read
via "Naked Security".
Naked Security
Mozilla adds NextDNS to list of DNS-over-HTTPS providers
Firefox users interested in turning on the browserβs DNS-over-HTTPS (DoH) privacy feature now have two providers to choose from.
β Doxed credit card data has two hours max before itβs nabbed β
π Read
via "Naked Security".
That's pretty slow for thieves' bots & scripts to grab it and test it, said a researcher who posted his card online.π Read
via "Naked Security".
Naked Security
Doxed credit card data has two hours max before itβs nabbed
Thatβs pretty slow for thievesβ bots & scripts to grab it and test it, said a researcher who posted his card online.
π The state of security in 2020 π
π Read
via "Security on TechRepublic".
Jack Wallen shares cybersecurity predictions that might make your IT skin crawl. Find out what he thinks could be the silver lining to this security nightmare.π Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity in 2020: Eight frightening predictions
Jack Wallen shares cybersecurity predictions that might make your IT skin crawl. Find out what he thinks could be the silver lining to this security nightmare.
π The Best Tools & Practices for Better Data Visibility and Monitoring π
π Read
via "Subscriber Blog RSS Feed ".
As the adage goes, you can't secure what you can't see. So, we asked 21 security experts what they think the best tools and practices for data visibility and monitoring are.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
The Best Tools & Practices for Better Data Visibility and Monitoring
As the adage goes, you can't secure what you can't see. With that in mind we asked 21 security experts what they think the best tools and practices for data visibility and monitoring are.
π΄ 'Password' Falls in the Ranks of Favorite Bad Passwords π΄
π Read
via "Dark Reading: ".
When it comes to choosing unsecure passwords, people instead show a preference for '123456' and '123456789.'π Read
via "Dark Reading: ".
Dark Reading
'Password' Falls in the Ranks of Favorite Bad Passwords
When it comes to choosing unsecure passwords, people instead show a preference for '123456' and '123456789.'
π΄ Your First Month as a CISO: Forming an Information Security Program π΄
π Read
via "Dark Reading: ".
It's easy to get overwhelmed in your new position, but these tips and resources will help you get started.π Read
via "Dark Reading: ".
Dark Reading
Your First Month as a CISO: Forming an Information Security Program
It's easy to get overwhelmed in your new position, but these tips and resources will help you get started.