β Is the Y2K bug alive after all? β
π Read
via "Naked Security".
One way to patch the millennium bug was to move it, rather than actually to fix it... are we looking at Y2.02K?π Read
via "Naked Security".
Naked Security
Is the Y2K bug alive after all?
One way to patch the millennium bug was to move it, rather than actually to fix it⦠are we looking at Y2.02K?
β Lifeline Assistance Phone Users Targeted with βUninstallableβ Adware β
π Read
via "Threatpost".
A Virgin Mobile-branded phone distributed by Assurance Wireless to low-income U.S. citizens has a trojan pre-installed that can download additional malware.π Read
via "Threatpost".
Threat Post
Lifeline Assistance Phone Users Targeted with βUninstallableβ Adware
A Virgin Mobile-branded phone distributed by Assurance Wireless to low-income U.S. citizens has a trojan pre-installed that can download additional malware.
β Cisco Webex Bug Allows Remote Code Execution β
π Read
via "Threatpost".
Cisco patched two high-severity flaws this week, in its Webex and IOS XE Software products.π Read
via "Threatpost".
Threat Post
Cisco Webex Bug Allows Remote Code Execution
Cisco patched two high-severity flaws this week, in its Webex and IOS XE Software products.
π΄ 6 Unique InfoSec Metrics CISOs Should Track in 2020 π΄
π Read
via "Dark Reading: ".
You might not find these measurements on a standard cybersecurity department checklist. But they can help evaluate risks you haven't even considered yet.π Read
via "Dark Reading: ".
Dark Reading
6 Unique InfoSec Metrics CISOs Should Track in 2020
You might not find these measurements on a standard cybersecurity department checklist. But they can help evaluate risks you haven't even considered yet.
π TP-Link routers get a little safer with AI-powered security features π
π Read
via "Security on TechRepublic".
The new features come from a partnership with security firm Avira, but they won't be free: They're part of a new package called HomeCare Pro.π Read
via "Security on TechRepublic".
TechRepublic
TP-Link routers get a little safer with AI-powered security features
The new features come from a partnership with security firm Avira, but they won't be free: They're part of a new package called HomeCare Pro.
π How AI, ML, and automation can improve cybersecurity protection π
π Read
via "Security on TechRepublic".
Read insights from industry experts on how artificial intelligence and machine learning will help prevent cybersecurity breaches.π Read
via "Security on TechRepublic".
TechRepublic
How AI, ML, and automation can improve cybersecurity protection
Read insights from industry experts on how artificial intelligence and machine learning will help prevent cybersecurity breaches.
ATENTIONβΌ New - CVE-2012-3824
π Read
via "National Vulnerability Database".
In Arial Campaign Enterprise before 11.0.551, multiple pages are accessible without authentication or authorization.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-3823
π Read
via "National Vulnerability Database".
Arial Campaign Enterprise before 11.0.551 stores passwords in clear text and these may be retrieved.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-3822
π Read
via "National Vulnerability Database".
Arial Campaign Enterprise before 11.0.551 has unauthorized access to the User-Edit.asp page, which allows remote attackers to enumerate users' credentials.π Read
via "National Vulnerability Database".
π΄ Major Brazilian Bank Tests Homomorphic Encryption on Financial Data π΄
π Read
via "Dark Reading: ".
The approach allowed researchers to use machine learning on encrypted data without first decrypting it.π Read
via "Dark Reading: ".
Dark Reading
Major Brazilian Bank Tests Homomorphic Encryption on Financial Data
The approach allowed researchers to use machine learning on encrypted data without first decrypting it.
ATENTIONβΌ New - CVE-2011-5020
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in the ID parameter in Online TV Database 2011.π Read
via "National Vulnerability Database".
π΄ Synopsys Buys Tinfoil π΄
π Read
via "Dark Reading: ".
Tinfoil Security's dynamic application and API security testing capabilities will be added to Synopsys Software Integrity Group.π Read
via "Dark Reading: ".
Dark Reading
Synopsys Buys Tinfoil
Tinfoil Security's dynamic application and API security testing capabilities will be added to Synopsys Software Integrity Group.
π CES 2020 roundup: All the business tech news you need to know π
π Read
via "Security on TechRepublic".
CES was more exciting than ever this year. Key topics included 5G, AI, IoT, robotics, Wi-Fi 6, edge computing, automation, blockchain, quantum computing, privacy, AR, and VR.π Read
via "Security on TechRepublic".
TechRepublic
CES 2020 roundup: All the business tech news you need to know
CES was more exciting than ever this year. Key topics included 5G, AI, IoT, robotics, Wi-Fi 6, edge computing, automation, blockchain, quantum computing, privacy, AR, and VR.
π CES 2020: Biggest tech trends spotted for business pros π
π Read
via "Security on TechRepublic".
From analytics and AI to 5G and Wi-Fi 6, here's all the enterprise tech that took center stage at CES 2020.π Read
via "Security on TechRepublic".
TechRepublic
CES 2020: Biggest tech trends spotted for business pros
From analytics and AI to 5G and Wi-Fi 6, here's all the enterprise tech that took center stage at CES 2020.
π Why big data may help you sleep better at night π
π Read
via "Security on TechRepublic".
At CES 2020, Sleep Number debuted its latest smart beds, which feature climate-controlled technology that gathers data while you snooze.π Read
via "Security on TechRepublic".
TechRepublic
Why big data may help you sleep better at night
At CES 2020, Sleep Number debuted its latest smart beds, which feature climate-controlled technology that gathers data while you snooze.
π CES 2020: Why HBO wants us to think twice about data privacy in the future π
π Read
via "Security on TechRepublic".
A Westworld-themed experience gave CES attendees a creepy glimpse into tech consequences of the future.π Read
via "Security on TechRepublic".
TechRepublic
CES 2020: Why HBO wants us to think twice about data privacy in the future
A Westworld-themed experience gave CES attendees a creepy glimpse into tech consequences of the future.
β Monday review β the hot 19 stories of the week β
π Read
via "Naked Security".
From a Firefox zero-day to a military ban on TikTok - and everything in between. It's the weekly security roundup.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Lawmakers look to spread COPPA out to cover kids up to 16 β
π Read
via "Naked Security".
If that bill passes, you can say bye-bye to YouTube, says one content creator.π Read
via "Naked Security".
Naked Security
Lawmakers look to spread COPPA out to cover kids up to 16
If that bill passes, you can say bye-bye to YouTube, says one content creator.
β Google urged to tame privacy-killing Android bloatware β
π Read
via "Naked Security".
A letter sent to the Google CEO by Privacy International claims bloatware has allowed a privacy and security hole to open almost unnoticed.π Read
via "Naked Security".
Naked Security
Google urged to tame privacy-killing Android bloatware
A letter sent to the Google CEO by Privacy International claims bloatware has allowed a privacy and security hole to open almost unnoticed.
β Reddit bans βimpersonation,β but satire and parody are still OK β
π Read
via "Naked Security".
Relax: Nic Cage deepfakes aren't going anywhere. It's only "maliciously misleading" impersonations that are now verboten.π Read
via "Naked Security".
Naked Security
Reddit bans βimpersonation,β but satire and parody are still OK
Relax: Nic Cage deepfakes arenβt going anywhere. Itβs only βmaliciously misleadingβ impersonations that are now verboten.
β Snake alert! This ransomware is not a gameβ¦ β
π Read
via "Naked Security".
Looks like the Snake ransomware was created especially for network-wide attacks.π Read
via "Naked Security".
Naked Security
Snake alert! This ransomware is not a gameβ¦
Looks like the Snake ransomware was created especially for network-wide attacks.