π΄ The Annoying MacOS Threat That Won't Go Away π΄
π Read
via "Dark Reading: ".
In two years, the adware-dropping Shlayer Trojan has spread to infect one in 10 MacOS systems, Kaspersky says.π Read
via "Dark Reading: ".
Darkreading
The Annoying MacOS Threat That Won't Go Away
In two years, the adware-dropping Shlayer Trojan has spread to infect one in 10 MacOS systems, Kaspersky says.
β Privacy watchdog throws wider net to protect children online β
π Read
via "Naked Security".
A new, comprehensive code will compel online services to put children's health and safety before data-collecting profits.π Read
via "Naked Security".
Naked Security
Privacy watchdog throws wider net to protect children online
A new, comprehensive code will compel online services to put childrenβs health and safety before data-collecting profits.
β 9th Methbot suspect arrested in massive clickfraud ring β
π Read
via "Naked Security".
How Sergey Denisoff described his early ad-buying ventures: buying BS popup traffic and reselling it to buyers demanding BS traffic.π Read
via "Naked Security".
Naked Security
9th Methbot suspect arrested in massive clickfraud ring
How Sergey Denisoff described his early ad-buying ventures: buying BS popup traffic and reselling it to buyers demanding BS traffic.
β Protestors petition equity firm over .org buyout β
π Read
via "Naked Security".
The street outside ICAAN's offices in Playa Vista, California, is likely a little more crowded than normal.π Read
via "Naked Security".
Naked Security
Protestors petition equity firm over .org buyout
The street outside ICANNβs offices in Playa Vista, California, is likely a little more crowded than normal.
β Fake Smart Factory Honeypot Highlights New Attack Threats β
π Read
via "Threatpost".
The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems.π Read
via "Threatpost".
Threat Post
Fake Smart Factory Honeypot Highlights New Attack Threats
The honeypot demonstrates the various security concerns plaguing vulnerable industrial control systems.
π΄ Online Employment Scams on the Rise, Says FBI π΄
π Read
via "Dark Reading: ".
Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.π Read
via "Dark Reading: ".
Dark Reading
Online Employment Scams on the Rise, Says FBI
Looking to change jobs? Watch out for fraudsters who use legitimate job services, slick websites, and an interview process to convince applicants to part with sensitive personal details.
π΄ 5 Resume Basics for a Budding Cybersecurity Career π΄
π Read
via "Dark Reading: ".
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.π Read
via "Dark Reading: ".
π How to set up secure credential storage for Docker π
π Read
via "Security on TechRepublic".
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.π Read
via "Security on TechRepublic".
TechRepublic
How to set up secure credential storage for Docker
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.
π How to add a host to Observium π
π Read
via "Security on TechRepublic".
Now that you have the Observium network monitoring platform installed, it's time to add a host.π Read
via "Security on TechRepublic".
TechRepublic
How to add a host to Observium
Now that you have the Observium network monitoring platform installed, it's time to add a host.
β Google finds privacy holes in Safariβs ITP anti-tracking system β
π Read
via "Naked Security".
Appleβs much-vaunted Intelligent Tracking Prevention (ITP) could leave users exposed to a raft of privacy issues, including - ironically - being tracked.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π TestSSL 3.0 π
π Go!
via "Security Tool Files β Packet Storm".
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
TestSSL 3.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β New Bill Proposes NSA Surveillance Reforms β
π Read
via "Threatpost".
The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.π Read
via "Threatpost".
Threat Post
New Bill Proposes NSA Surveillance Reforms
The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S. government to collect telephone data from millions of Americans.
π Hackers targeting Arabic-speaking countries with malicious Microsoft Office documents π
π Read
via "Security on TechRepublic".
Cybercriminals created a homemade RAT that uses multiple cloud services and targets countries like Saudi Arabia, Iraq, Egypt, Libya, Algeria, and Morocco.π Read
via "Security on TechRepublic".
π Friday Five: 1/24 Edition π
π Read
via "Subscriber Blog RSS Feed ".
Job performance details of over 900 employees left exposed online, a new ransomware family targets Windows 10 users, and more - catch up on the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 1/24 Edition
Job performance details of over 900 employees left exposed online, a new ransomware family targets Windows 10 users, and more - catch up on the week's news with the Friday Five.
β Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings β
π Read
via "Threatpost".
The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.π Read
via "Threatpost".
Threat Post
Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings
The flaw could allow a remote, unauthenticated attacker to enter a password-protected video conference meeting.
π΄ 'CardPlanet' Operator Pleads Guilty in Federal Court π΄
π Read
via "Dark Reading: ".
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.π Read
via "Dark Reading: ".
Darkreading
'CardPlanet' Operator Pleads Guilty in Federal Court
Russian national faced multiple charges in connection with operating the marketplace for stolen credit-card credentials, and a forum for VIP criminals to offer their services.
β ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates β
π Read
via "Threatpost".
Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.π Read
via "Threatpost".
Threat Post
ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates
Ransomware actors are turning their sights on larger enterprises, making both average cost and downtime inflicted from attacks skyrocket.
π΄ 7 Steps to IoT Security in 2020 π΄
π Read
via "Dark Reading: ".
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.π Read
via "Dark Reading: ".
Dark Reading
7 Steps to IoT Security in 2020
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.
π΄ New Social Engineering Event to Train Business Pros on Human Hacking π΄
π Read
via "Dark Reading: ".
The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior.π Read
via "Dark Reading: ".
Dark Reading
New Social Engineering Event to Train Business Pros on Human Hacking
The DEF CON Social Engineering Capture the Flag contest inspired a new event aimed at teaching both security and non-security professionals on the fine art of hacking human behavior.
π Lulzbuster 1.0.0 π
π Go!
via "Security Tool Files β Packet Storm".
Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Lulzbuster 1.0.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers