π΄ Texas School District Loses $2.3M to Phishing Attack π΄
π Read
via "Dark Reading: ".
The Manor Independent School District is investigating a phishing email scam that led to three separate fraudulent transactions.π Read
via "Dark Reading: ".
Dark Reading
Texas School District Loses $2.3M to Phishing Attack
The Manor Independent School District is investigating a phishing email scam that led to three separate fraudulent transactions.
π΄ An Identity Management Spin on Shaggy's Hit Song π΄
π Read
via "Dark Reading: ".
Wondering how this guy could be so clumsy? So is he.π Read
via "Dark Reading: ".
Dark Reading
An Identity Management Spin on Shaggy's Hit Song
Wondering how this guy could be so clumsy? So is he.
π CES 2020: Why HBO wants us to think twice about data privacy π
π Read
via "Security on TechRepublic".
A Westworld-themed experience gave attendees a creepy glimpse into tech consequences of the future.π Read
via "Security on TechRepublic".
TechRepublic
CES 2020: Why HBO wants us to think twice about data privacy
A Westworld-themed experience gave attendees a creepy glimpse into tech consequences of the future.
π Virginia Introduces Privacy Law Of Its Own π
π Read
via "Subscriber Blog RSS Feed ".
Virginia appears to be following in the footsteps of California with a new legislation, the Virginia Privacy Act, that would strengthen the data privacy rights of Virginians.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Virginia Introduces Privacy Law Of Its Own
Virginia appears to be following in the footsteps of California with new legislation, the Virginia Privacy Act, that would strengthen the data privacy rights of Virginians.
β CES Surveillance Hype Worries Privacy Advocates β
π Read
via "Threatpost".
CES wiz-bang surveillance tech gives privacy advocates the willies.π Read
via "Threatpost".
Threat Post
CES Surveillance Hype Worries Privacy Advocates
CES wiz-bang surveillance tech gives privacy advocates the willies.
π December's Most Wanted Malware: Greta Thunberg-themed spam used to spread Emotet π
π Read
via "Security on TechRepublic".
Check Point's December 2019 Index finds Emotet as lead malware for the third month in a row, spreading email spam, some which alleged support of the teen activist.π Read
via "Security on TechRepublic".
TechRepublic
December's Most Wanted Malware: Greta Thunberg-themed spam used to spread Emotet
Check Point's December 2019 Index finds Emotet as lead malware for the third month in a row, spreading email spam, some which alleged support of the teen activist.
β Joker Android Malware Snowballs on Google Play β
π Read
via "Threatpost".
Google has removed 17,000 Joker-infested apps from the Play store to date.π Read
via "Threatpost".
Threat Post
Joker Android Malware Snowballs on Google Play
Google has removed 17,000 Joker-infested apps from the Play store to date.
β Scammers Dupe Texas School District Out of $2.3M β
π Read
via "Threatpost".
The wide-scale phishing scam reportedly started in early November and continued through December, before it was discovered by the Texas school district.π Read
via "Threatpost".
Threat Post
Scammers Dupe Texas School District Out of $2.3M
The wide-scale phishing scam reportedly started in early November and continued through December, before it was discovered by the Texas school district.
π΄ Microsoft to Officially End Support for Windows 7, Server 2008 π΄
π Read
via "Dark Reading: ".
Windows 7 and Server 2008 will continue to work after Jan. 14, 2020, but will no longer receive security updates.π Read
via "Dark Reading: ".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
π΄ What Questions Should I Keep in Mind to Improve My Security Metrics? π΄
π Read
via "Dark Reading: ".
If you can answer these six questions, you'll be off to a great start.π Read
via "Dark Reading: ".
Dark Reading
What Questions Should I Keep in Mind to Improve My Security Metrics?
If you can answer these six questions, you'll be off to a great start.
π΄ Exploits Released for As-Yet Unpatched Critical Citrix Flaw π΄
π Read
via "Dark Reading: ".
Organizations need to apply mitigations for vulnerability in Citrix Application Delivery Controller and Citrix Gateway ASAP, security researchers say.π Read
via "Dark Reading: ".
Dark Reading
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Organizations need to apply mitigations for vulnerability in Citrix Application Delivery Controller and Citrix Gateway ASAP, security researchers say.
π΄ Website Collecting Australian Fire Donations Hit by Magecart π΄
π Read
via "Dark Reading: ".
The attack may have compromised donors' payment information.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π What to do if you're still running Windows 7 π
π Read
via "Security on TechRepublic".
Your best bet is to finish a migration to Windows 10 ASAP, but there are other options in the interim, says content delivery company Kollective.π Read
via "Security on TechRepublic".
TechRepublic
What to do if you're still running Windows 7
Your best bet is to finish a migration to Windows 10 ASAP, but there are other options in the interim, says content delivery company Kollective.
β Microsoft now reviewing Skype audio in βsecureβ places (not China) β
π Read
via "Naked Security".
A former contractor in Beijing: βIt sounds a bit crazy now [...] that they gave me the URL, a username and password sent over email.βπ Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Lottery hacker gets 9 months for his Β£5 cut of the loot β
π Read
via "Naked Security".
We don't care how little you made from your crimes, the judge said. We care that you went after an outfit that gives a ton to charities.π Read
via "Naked Security".
Naked Security
Lottery hacker gets 9 months for his Β£5 cut of the loot
We donβt care how little you made from your crimes, the judge said. We care that you went after an outfit that gives a ton to charities.
β Google tests biometric authentication for Android autofill β
π Read
via "Naked Security".
Google is testing out a feature to make Android's built-in password manager safer.π Read
via "Naked Security".
Naked Security
Google tests biometric authentication for Android autofill
Google is testing out a feature to make Androidβs built-in password manager safer.
β βCable Hauntβ vulnerability exposes 200 million cable modem users β
π Read
via "Naked Security".
A fortnight in to 2020 and we have the first security flaw to be given its own name: Cable Haunt - complete with eye-catching logo.π Read
via "Naked Security".
Naked Security
βCable Hauntβ vulnerability exposes 200 million cable modem users
A fortnight in to 2020 and we have the first security flaw to be given its own name: Cable Haunt β complete with eye-catching logo.
β Apple Denies FBI Request to Unlock Shooterβs iPhoneβAgain β
π Read
via "Threatpost".
Refusal to unlock the phones of a Florida shooter could set up another legal battle between Apple and the Feds over data privacy in the case of criminal investigations.π Read
via "Threatpost".
Threat Post
Apple Denies FBI Request to Unlock Shooterβs iPhoneβAgain
Refusal to unlock the phones of a Florida shooter could set up another legal battle between Apple and the Feds over data privacy in the case of criminal investigations.
π΄ How to Keep Security on Life Support After Software End-of-Life π΄
π Read
via "Dark Reading: ".
It's the end of support this week for Windows 7 and Server 2008. But what if you truly can't migrate off software, even after security updates stop coming?π Read
via "Dark Reading: ".
Dark Reading
How to Keep Security on Life Support After Software End-of-Life
It's the end of support this week for Windows 7 and Server 2008. But what if you truly can't migrate off software, even after security updates stop coming?
π΄ Industrial Control System Features at Risk π΄
π Read
via "Dark Reading: ".
How some ICS product functions can be weaponized by altering their configurations.π Read
via "Dark Reading: ".
Dark Reading
Industrial Control System Features at Risk
How some ICS product functions can be weaponized by altering their configurations.
π΄ Processor Vulnerabilites Put Virtual Workloads at Risk π΄
π Read
via "Dark Reading: ".
Meltdown, Spectre exploits will likely lead to customers making tradeoffs between performance and security of applications, especially virtual and cloud-based appsπ Read
via "Dark Reading: ".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading