β Facebook to pay $550m to settle face-tagging suit β
π Read
via "Naked Security".
A class-action lawsuit against Facebook for the use of its tag suggestions feature looks like it's finally done churning through the courts.π Read
via "Naked Security".
Naked Security
Facebook to pay $550m to settle face-tagging suit
A class-action lawsuit against Facebook for the use of its tag suggestions feature looks like itβs finally done churning through the courts.
β Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program β
π Read
via "Threatpost".
Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.π Read
via "Threatpost".
Threat Post
Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program
Program is the latest the tech giant has launched that pay users and security researchers to find vulnerabilities in its numerous products.
β Financial tech firms disagree on ban of customer data screen-scraping β
π Read
via "Naked Security".
They use it to offer things like budgeting apps. It puts passwords and privacy at risk, but some say they can't afford to build APIs instead.π Read
via "Naked Security".
Naked Security
Financial tech firms disagree on ban of customer data screen-scraping
They use it to offer things like budgeting apps. It puts passwords and privacy at risk, but some say they canβt afford to build APIs instead.
β US Interior Dept extends drone grounding over foreign hacking fears β
π Read
via "Naked Security".
The DOI has doubled down on a previous order, keeping the agencyβs drones grounded for another 30 days for a more in-depth security review.π Read
via "Naked Security".
Naked Security
US Interior Dept extends drone grounding over foreign hacking fears
The DOI has doubled down on a previous order, keeping the agencyβs drones grounded for another 30 days for a more in-depth security review.
β UN hacked via unpatched SharePoint server β
π Read
via "Naked Security".
UN staffers: the "entire domain" was probably compromised by an attacker who was lurking on the UN's networks.π Read
via "Naked Security".
Naked Security
UN hacked via unpatched SharePoint server
UN staffers: the βentire domainβ was probably compromised by an attacker who was lurking on the UNβs networks.
β Sodinokibi Ransomware Group Sponsors Hacking Contest β
π Read
via "Threatpost".
Larger winnings for underground skills competitions are attracting sophisticated crime groups.π Read
via "Threatpost".
Threat Post
Sodinokibi Ransomware Group Sponsors Hacking Contest
Larger winnings for underground skills competitions are attracting sophisticated crime groups.
π΄ Embracing a Prevention Mindset to Protect Critical Infrastructure π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Darkreading
Embracing a Prevention Mindset to Protect Critical Infrastructure
A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward.
π How to avoid the mistakes made in the UN data breach π
π Read
via "Security on TechRepublic".
Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.π Read
via "Security on TechRepublic".
TechRepublic
How to avoid the mistakes made in the UN data breach
Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.
π Lulzbuster 1.1.0 π
π Go!
via "Security Tool Files β Packet Storm".
Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Lulzbuster 1.1.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π TOR Virtual Network Tunneling Tool 0.4.2.6 π
π Go!
via "Security Tool Files β Packet Storm".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.2.6 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Faraday 3.10.2 π
π Go!
via "Security Tool Files β Packet Storm".
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Faraday 3.10.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Zero Day Initiative Bug Hunters Rake in $1.5M in 2019 β
π Read
via "Threatpost".
Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.π Read
via "Threatpost".
Threat Post
Zero Day Initiative Bug Hunters Rake in $1.5M in 2019
Microsoft OS flaws, out-of-bounds reads, ICS gear and a record number of high-severity bugs marked 2019 for the ZDI program.
π How to change iOS 13 settings for better security π
π Read
via "Security on TechRepublic".
Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings.π Read
via "Security on TechRepublic".
TechRepublic
How to change iOS 13 settings for better security
Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings.
β Serious Security β How βspecial caseβ code blew a hole in OpenSMTPD β
π Read
via "Naked Security".
Patch now before you receive a message that's more than just bad news!π Read
via "Naked Security".
Naked Security
Serious Security β How βspecial caseβ code blew a hole in OpenSMTPD
Patch now before you receive a message thatβs more than just bad news!
π΄ AppSec Concerns Drove 61% of Businesses to Change Applications π΄
π Read
via "Dark Reading: ".
According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.π Read
via "Dark Reading: ".
Dark Reading
AppSec Concerns Drove 61% of Businesses to Change Applications
According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.
π Friday Five: 1/31 Edition π
π Read
via "Subscriber Blog RSS Feed ".
The state of New York may ban ransomware payments, NFL Twitter accounts get hacked, and Facebook releases a new data privacy tool for users - catch up on the week's news with the Friday Five.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 1/31 Edition
The state of New York may ban ransomware payments, NFL Twitter accounts get hacked, and Facebook releases a new data privacy tool for users - catch up on the week's news with the Friday Five.
ATENTIONβΌ New - CVE-2011-4117
π Read
via "National Vulnerability Database".
The Batch::BatchRun module 1.03 for Perl does not properly handle temporary files.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4116
π Read
via "National Vulnerability Database".
_is_safe in the File::Temp module for Perl does not properly handle symlinks.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4115
π Read
via "National Vulnerability Database".
Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4088
π Read
via "National Vulnerability Database".
ABRT might allow attackers to obtain sensitive information from crash reports.π Read
via "National Vulnerability Database".