β Peekaboo Moments baby-recording app has a bad database booboo β
π Read
via "Naked Security".
No need to wait until you've gurgled out of your mother's womb to experience the joys of having your privacy breached.π Read
via "Naked Security".
Naked Security
Peekaboo Moments baby-recording app has a bad database booboo
No need to wait until youβve gurgled out of your motherβs womb to experience the joys of having your privacy breached.
β Oski Data-Stealing Malware Emerges to Target North America, China β
π Read
via "Threatpost".
The malware is new and in the early stages of its development -- but packs a sophisticated punch.π Read
via "Threatpost".
Threat Post
Oski Data-Stealing Malware Emerges to Target North America, China
The malware is new and in the early stages of its development β but packs a sophisticated punch.
β Malicious npm package taken down after Microsoft warning β
π Read
via "Naked Security".
Criminals have been caught trying to sneak a malicious package on to the popular Node.js platform npm (Node Package Manager).π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Microsoft fixes critical bugs in CryptoAPI, RD Gateway and .NET β
π Read
via "Naked Security".
Here are the most serious bugs from Microsoft's Patch Tuesday - Including CryptoAPI and RCE flaws in Windows Remote Desktop Gateway.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Why corporate boards are unprepared to handle cybersecurity risks π
π Read
via "Security on TechRepublic".
A new report recommends that corporate boards answer four key questions on a regular basis to guide cybersecurity governance.π Read
via "Security on TechRepublic".
TechRepublic
Why corporate boards are unprepared to handle cybersecurity risks
A new report recommends that corporate boards answer four key questions on a regular basis to guide cybersecurity governance.
π΄ How SD-WAN Helps Achieve Data Security and Threat Protection π΄
π Read
via "Dark Reading: ".
Enterprises currently consider the technology a best practice because of its flexibility, scalability, performance, and agility.π Read
via "Dark Reading: ".
Dark Reading
How SD-WAN Helps Achieve Data Security and Threat Protection
Enterprises currently consider the technology a best practice because of its flexibility, scalability, performance, and agility.
π Microsoft rolls out patch for serious Windows bug highlighted by NSA π
π Read
via "Security on TechRepublic".
Designed to exploit a vulnerability in Windows 10 and Windows Server 2016 and 2019, the bug could allow an attacker to remotely access and control an infected computer.π Read
via "Security on TechRepublic".
ATENTIONβΌ New - CVE-2012-1563
π Read
via "National Vulnerability Database".
Joomla! before 2.5.3 allows Admin Account Creation.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-1562
π Read
via "National Vulnerability Database".
Joomla! core before 2.5.3 allows unauthorized password change.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-1326
π Read
via "National Vulnerability Database".
Cisco IronPort Web Security Appliance up to and including 7.5 does not validate the basic constraints of the certificate authority which could lead to MITM attacksπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-1316
π Read
via "National Vulnerability Database".
Cisco IronPort Web Security Appliance does not check for certificate revocation which could lead to MITM attacksπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-0945
π Read
via "National Vulnerability Database".
whoopsie-daisy before 0.1.26: Root user can remove arbitrary filesπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-0334
π Read
via "National Vulnerability Database".
Cisco IronPort Web Security Appliance AsyncOS software prior to 7.5 has a SSL Certificate Caching vulnerability which could allow man-in-the-middle attacksπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-0070
π Read
via "National Vulnerability Database".
spamdyke prior to 4.2.1: STARTTLS reveals plaintextπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4907
π Read
via "National Vulnerability Database".
Joomla! 1.5x through 1.5.12: Missing JEXEC Checkπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4336
π Read
via "National Vulnerability Database".
Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php.π Read
via "National Vulnerability Database".
β Trump Slams Apple for Refusing to Unlock Suspected Shooterβs iPhones β
π Read
via "Threatpost".
Legal battle pitting Feds against the tech giant over data privacy and device security in criminal cases seems inevitable.π Read
via "Threatpost".
Threat Post
Trump Slams Apple for Refusing to Unlock Suspected Shooterβs iPhones
Legal battle pitting Feds against the tech giant over data privacy and device security in criminal cases seems inevitable.
π How to disconnect devices and revoke app privileges from your Firefox cloud account π
π Read
via "Security on TechRepublic".
You'll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them.π Read
via "Security on TechRepublic".
TechRepublic
How to disconnect devices and revoke app privileges from your Firefox cloud account
You'll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them.
π Why Google plans to cut off support for third-party cookies in Chrome π
π Read
via "Security on TechRepublic".
Google is aiming to phase out third-party cookies in Chrome in two years, but that will have to prove palatable to users, publishers, and advertisers.π Read
via "Security on TechRepublic".
TechRepublic
Why Google plans to cut off support for third-party cookies in Chrome
Google is aiming to phase out third-party cookies in Chrome in two years, but that will have to prove palatable to users, publishers, and advertisers.
π΄ ISACs Join Forces to Secure the Travel Industry π΄
π Read
via "Dark Reading: ".
Together, the Travel & Hospitality ISAC and the Retail & Hospitality ISAC intend to improve communications and collaboration about the evolving threat landscape.π Read
via "Dark Reading: ".
Dark Reading
ISACs Join Forces to Secure the Travel Industry
Together, the Travel & Hospitality ISAC and the Retail & Hospitality ISAC intend to improve communications and collaboration about the evolving threat landscape.
π΄ How to Comprehend the Buzz About Honeypots π΄
π Read
via "Dark Reading: ".
Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe and useful for your organization.π Read
via "Dark Reading: ".
Dark Reading
How to Comprehend the Buzz About Honeypots
Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe a