β S2 Ep24: Tinder, angry customers and weleakinfo takedown β Naked Security Podcast β
π Read
via "Naked Security".
New episode available now.π Read
via "Naked Security".
Naked Security
S2 Ep24: Tinder, angry customers and weleakinfo takedown β Naked Security Podcast
New episode available now.
π΄ Enterprise Hardware Still Vulnerable to Memory Lane Attacks π΄
π Read
via "Dark Reading: ".
Most laptops, workstations, and servers are still vulnerable to physical attacks via direct memory access, despite mitigations often being available, report says.π Read
via "Dark Reading: ".
Darkreading
Enterprise Hardware Still Vulnerable to Memory Lane Attacks
Most laptops, workstations, and servers are still vulnerable to physical attacks via direct memory access, despite mitigations often being available, report says.
β Cisco Patches Two High-Severity Bugs in its Small Business Switch Lineup β
π Read
via "Threatpost".
Vulnerabilities allow unauthenticated remote attackers to access sensitive device information and launch denial of service attacks.π Read
via "Threatpost".
Threat Post
Cisco Patches Two High-Severity Bugs in its Small Business Switch Lineup
Vulnerabilities allow unauthenticated remote attackers to access sensitive device information and launch denial of service attacks.
β Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication β
π Read
via "Threatpost".
The recently disclosed Jeff Bezos phone hack and other incidents show that mobile devices are being increasingly targeted by sophisticated nation-state attackers.π Read
via "Threatpost".
Threat Post
Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication
The recently disclosed Jeff Bezos phone hack and other incidents show that mobile devices are being increasingly targeted by sophisticated nation-state attackers.
π΄ United Nations Data Breach Started with Microsoft SharePoint Bug π΄
π Read
via "Dark Reading: ".
A remote code execution flaw enabled a breach of UN offices in Geneva and Vienna, as well as the Office of the High Commissioner for Human Rights.π Read
via "Dark Reading: ".
Darkreading
United Nations Data Breach Started with Microsoft SharePoint Bug
A remote code execution flaw enabled a breach of UN offices in Geneva and Vienna, as well as the Office of the High Commissioner for Human Rights.
β Coronavirus Campaigns Spread Emotet, Malware β
π Read
via "Threatpost".
The ongoing global spread of the disease precipitates malware infections.π Read
via "Threatpost".
Threat Post
Coronavirus Campaigns Spread Emotet, Malware
The ongoing global spread of the disease precipitates malware infections.
π Report Claims Servers at United Nations Hacked π
π Read
via "Subscriber Blog RSS Feed ".
The U.N. confirmed the incident but there are conflicting reports whether or not data was exfiltrated as a result.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Report Claims Servers at United Nations Hacked
The U.N. confirmed the incident but there are conflicting reports whether or not data was exfiltrated as a result.
π΄ How to Secure Your IoT Ecosystem in the Age of 5G π΄
π Read
via "Dark Reading: ".
For businesses planning to adopt 5G, the sheer number of IoT devices creates a much larger attack surface.π Read
via "Dark Reading: ".
Darkreading
How to Secure Your IoT Ecosystem in the Age of 5G
For businesses planning to adopt 5G, the sheer number of IoT devices creates a much larger attack surface.
π 97 of the world's 100 largest airports have massive cybersecurity risks π
π Read
via "Security on TechRepublic".
An investigation of airport cybersecurity found glaring gaps in security for web and mobile applications, misconfigured public clouds, Dark Web exposure and code repositories leaks.π Read
via "Security on TechRepublic".
TechRepublic
97 of the world's 100 largest airports have massive cybersecurity risks
An investigation of airport cybersecurity found glaring gaps in security for web and mobile applications, misconfigured public clouds, Dark Web exposure and code repositories leaks.
π΄ I'm an SMB. What Should I Watch for When Choosing Security Vendors and Their Products? π΄
π Read
via "Dark Reading: ".
SMBs need action, not just insight.π Read
via "Dark Reading: ".
Dark Reading
I'm an SMB. What Should I Watch for When Choosing Security Vendors and Their Products?
SMBs need action, not just insight.
π΄ I'm an SMB. What Should I Watch for When Choosing Security Vendors? π΄
π Read
via "Dark Reading: ".
SMBs need action, not just insight.π Read
via "Dark Reading: ".
Dark Reading
I'm an SMB. What Should I Watch for When Choosing Security Vendors?
SMBs need action, not just insight.
π Top 10 tech policy trends to watch in 2020 π
π Read
via "Security on TechRepublic".
Given the tech industry's poor track record of protecting users data and controlling its environmental impact, regulators around the globe are stepping into the void.π Read
via "Security on TechRepublic".
TechRepublic
Top 10 tech policy trends to watch in 2020
Given the tech industry's poor track record of protecting users data and controlling its environmental impact, regulators around the globe are stepping into the void.
β 200K WordPress Sites Vulnerable to Plugin Flaw β
π Read
via "Threatpost".
Developers behind WordPress plugin Code Snippets have issued a patch for the high-severity flaw.π Read
via "Threatpost".
Threat Post
200K WordPress Sites Vulnerable to Plugin Flaw
Developers behind WordPress plugin Code Snippets have issued a patch for the high-severity flaw.
π΄ How To Keep Your Privacy and Data Secure While Working With a Remote Team π΄
π Read
via "Dark Reading: ".
Implementing basic strategies can ensure your remote team's work will be secure, data will be protected, and you'll be far less exposed to security risks.π Read
via "Dark Reading: ".
Dark Reading
How To Keep Your Privacy and Data Secure While Working With a Remote Team
Implementing basic strategies can ensure your remote team's work will be secure, data will be protected, and you'll be far less exposed to security risks.
π΄ Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners π΄
π Read
via "Dark Reading: ".
Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money - and cred with major criminal syndicates.π Read
via "Dark Reading: ".
Darkreading
Russian Cybercrime Forum Contests Bring Cash, Visibility to Winners
Competitions for users are a long-time tradition on underground cybercrime forums for members looking for money - and cred with major criminal syndicates.
π΄ Android Malware for Mobile Ad Fraud Spiked Sharply in 2019 π΄
π Read
via "Dark Reading: ".
Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says.π Read
via "Dark Reading: ".
Dark Reading
Android Malware for Mobile Ad Fraud Spiked Sharply in 2019
Some 93% of all mobile transactions across 20 countries were blocked as fraudulent, Upstream says.
π΄ Two Vulnerabilities Found in Microsoft Azure Infrastructure π΄
π Read
via "Dark Reading: ".
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.π Read
via "Dark Reading: ".
Darkreading
Two Vulnerabilities Found in Microsoft Azure Infrastructure
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.
π How organizations should handle data breaches π
π Read
via "Security on TechRepublic".
How an organization handles a breach can be just as critical as protecting against one, according to Security.org.π Read
via "Security on TechRepublic".
TechRepublic
How organizations should handle data breaches
How an organization handles a breach can be just as critical as protecting against one, according to Security.org.
β Facebook to pay $550m to settle face-tagging suit β
π Read
via "Naked Security".
A class-action lawsuit against Facebook for the use of its tag suggestions feature looks like it's finally done churning through the courts.π Read
via "Naked Security".
Naked Security
Facebook to pay $550m to settle face-tagging suit
A class-action lawsuit against Facebook for the use of its tag suggestions feature looks like itβs finally done churning through the courts.
β Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program β
π Read
via "Threatpost".
Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.π Read
via "Threatpost".
Threat Post
Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program
Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.