β Smartphone location data can be used to identify and track anyone β
π Read
via "Naked Security".
In todayβs smartphone economy, hiding your location has become a major challenge.π Read
via "Naked Security".
Naked Security
Smartphone location data can be used to identify and track anyone
In todayβs smartphone economy, hiding your location has become a major challenge.
β Podcast: What Weβve Learned from the Year of the Breach β
π Read
via "Threatpost".
In this sponsored podcast, Threatpost sits down with Arctic Wolf's Matt Duench to discuss the lessons learned from this year's top data breaches.π Read
via "Threatpost".
Threat Post
Podcast: What Weβve Learned from the Year of the Breach
In this sponsored podcast, Threatpost sits down with Arctic Wolf's Matt Duench to discuss the lessons learned from this year's top data breaches.
β Top 10 IoT Disasters of 2019 β
π Read
via "Threatpost".
From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children's connected toys, here are the top IoT disasters in 2019.π Read
via "Threatpost".
Threat Post
Top 10 IoT Disasters of 2019
From more widescale, powerful distributed denial of service (DDoS) attacks, to privacy issues in children's connected toys, here are the top IoT disasters in 2019.
π What is a Cloud Access Security Broker? π
π Read
via "Subscriber Blog RSS Feed ".
What a cloud access security broker, or CASB? Learn about the benefits, best practices, and use cases in this week's Data Protection 101, our series on the fundamentals of information security.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
What is a Cloud Access Security Broker?
What a cloud access security broker, or CASB? Learn about the benefits, best practices, and use cases in this week's Data Protection 101, our series on the fundamentals of information security.
π΄ 20 Vulnerabilities to Prioritize Patching Before 2020 π΄
π Read
via "Dark Reading: ".
Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.π Read
via "Dark Reading: ".
Dark Reading
20 Vulnerabilities to Prioritize Patching Before 2020
Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.
π΄ 2020 & Beyond: The Evolution of Cybersecurity π΄
π Read
via "Dark Reading: ".
As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.π Read
via "Dark Reading: ".
Darkreading
2020 & Beyond: The Evolution of Cybersecurity
As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.
π΄ Former NY Hospital Employee Admits to Stealing Colleagues' Data π΄
π Read
via "Dark Reading: ".
Richard Liriano pleads guilty to compromising hospital computers and co-workers' email accounts, as well as stealing personal files and photos.π Read
via "Dark Reading: ".
Darkreading
Former NY Hospital Employee Admits to Stealing Colleagues' Data
Richard Liriano pleads guilty to compromising hospital computers and co-workers' email accounts, as well as stealing personal files and photos.
π΄ Mastercard Announces Plan to Purchase RiskRecon π΄
π Read
via "Dark Reading: ".
The acquisition is expected to close in the first quarter of 2020.π Read
via "Dark Reading: ".
Dark Reading
Mastercard Announces Plan to Purchase RiskRecon
The acquisition is expected to close in the first quarter of 2020.
β Serious Security: The decade-ending βY2K bugβ that wasnβt β
π Read
via "Naked Security".
We explain why you really need to RTFM. Even if TFM is very long and complicated and you are very experienced.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Twitter Fixes Bug that Enabled Takeover of Android App Accounts β
π Read
via "Threatpost".
Twitter for Android users are urged to update their app to fend off a security bug that allows hackers to access private account data and control accounts to send tweets and direct messages.π Read
via "Threatpost".
Threat Post
Twitter Fixes Bug that Enabled Takeover of Android App Accounts
Twitter for Android users are urged to update their app to fend off a security bug that allows hackers to access private account data and control accounts to send tweets and direct messages.
π΄ Citrix Urges Firms to Harden Configurations After Flaw Report π΄
π Read
via "Dark Reading: ".
A vulnerability in two of the company's appliances opens 80,000 networks up for exploitation.π Read
via "Dark Reading: ".
Dark Reading
Citrix Urges Firms to Harden Configurations After Flaw Report
A vulnerability in two of the company's appliances opens 80,000 networks up for exploitation.
π΄ Santa and the Zero-Trust Model: A Christmas Story π΄
π Read
via "Dark Reading: ".
How would the world's most generous elf operate in a world of zero-trust security? A group of cybersecurity experts lets us know.π Read
via "Dark Reading: ".
Dark Reading
Santa and the Zero-Trust Model: A Christmas Story
How would the world's most generous elf operate in a world of zero-trust security? A group of cybersecurity experts lets us know.
π 4 tips to help keep your APIs safe π
π Read
via "Security on TechRepublic".
Security analysts say multifactor authentication is an absolute must for any company running multiple interfaces.π Read
via "Security on TechRepublic".
TechRepublic
4 tips to help keep your APIs safe
Security analysts say multifactor authentication is an absolute must for any company running multiple interfaces.
β What a decade! Our baddest stories and biggest lessons, year by yearβ¦ β
π Read
via "Naked Security".
From the bizarre, through the crazy, all the way to the outright impossible - there's still plenty to learn from all of these stories.π Read
via "Naked Security".
Naked Security
What a decade! Our baddest stories and biggest lessons, year by yearβ¦
From the bizarre, through the crazy, all the way to the outright impossible β thereβs still plenty to learn from all of these stories.
π΄ IoT Security: How Far We've Come, How Far We Have to Go π΄
π Read
via "Dark Reading: ".
As organizations fear the proliferations of connected devices on enterprise networks, the private and public sector come together to address IoT vulnerabilities.π Read
via "Dark Reading: ".
Dark Reading
IoT Security: How Far We've Come, How Far We Have to Go
As organizations fear the proliferations of connected devices on enterprise networks, the private and public sector come together to address IoT vulnerabilities.
β The Case for Cyber-Risk Prospectuses β
π Read
via "Threatpost".
Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.π Read
via "Threatpost".
Threat Post
The Case for Cyber-Risk Prospectuses
Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.
ATENTIONβΌ New - CVE-2017-16778
π Read
via "National Vulnerability Database".
An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel allows physical attackers to inject a Dual-Tone-Multi-Frequency (DTMF) tone to invoke an access grant that would allow physical access to a restricted floor/level. By design, only a residential unit owner may allow such an access grant. However, due to incorrect access control, an attacker could inject it via the speaker unit to perform an access grant to gain unauthorized access, as demonstrated by a loud DTMF tone representing '1' and a long '#' (697 Hz and 1209 Hz, followed by 941 Hz and 1477 Hz).π Read
via "National Vulnerability Database".
β Sextortionists return for Christmas β price goes down, threats go up β
π Read
via "Naked Security".
This follow-up sextortion demand, timed to align with Christmas, has a much more aggressive and menacing tone that last week's version.π Read
via "Naked Security".
Naked Security
Sextortionists return for Christmas β price goes down, threats go up
This follow-up sextortion demand, timed to align with Christmas, has a much more aggressive and menacing tone that last weekβs version.
β Biggest Malware Threats of 2019 β
π Read
via "Threatpost".
2019 was another banner year for bots, trojans, RATS and ransomware. Letβs take a look back.π Read
via "Threatpost".
Threat Post
Biggest Malware Threats of 2019
2019 was another banner year for bots, trojans, RATS and ransomware. Letβs take a look back.
π How to install and use Firejail on Linux π
π Read
via "Security on TechRepublic".
Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.π Read
via "Security on TechRepublic".
TechRepublic
How to install and use Firejail on Linux
Firejail allows you to easily sandbox Linux applications. Find out how to add this extra layer of security.