ATENTIONβΌ New - CVE-2008-3793
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3792. Reason: This candidate is a duplicate of CVE-2008-3792. Notes: All CVE users should reference CVE-2008-3792 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
π΄ From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide π΄
π Read
via "Dark Reading: ".
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.π Read
via "Dark Reading: ".
Darkreading
From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide
Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.
π΄ Poll: A Matter of Trust π΄
π Read
via "Dark Reading: ".
Has working in the cybersecurity industry affected your ability to trust? Take the poll now.π Read
via "Dark Reading: ".
Dark Reading
Poll: A Matter of Trust
Has working in the cybersecurity industry affected your ability to trust? Take the poll now.
π Hackers imitating CDC, WHO with coronavirus phishing emails π
π Read
via "Security on TechRepublic".
Cybercriminals are now using fears over the outbreak to steal email credentials, security officials say.π Read
via "Security on TechRepublic".
TechRepublic
Hackers imitating CDC, WHO with coronavirus phishing emails
Cybercriminals are now using fears over the outbreak to steal email credentials, security officials say.
π΄ RobbinHood Kills Security Processes Before Dropping Ransomware π΄
π Read
via "Dark Reading: ".
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.π Read
via "Dark Reading: ".
Darkreading
RobbinHood Kills Security Processes Before Dropping Ransomware
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.
π How to use 7zip to encrypt files π
π Read
via "Security on TechRepublic".
If you need strong command line encryption on Linux, look no further than 7zip.π Read
via "Security on TechRepublic".
TechRepublic
How to use 7zip to encrypt files | TechRepublic
If you need strong command line encryption on Linux, look no further than 7zip.
π΄ CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten' π΄
π Read
via "Dark Reading: ".
Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.π Read
via "Dark Reading: ".
Dark Reading
CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten'
Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.
β Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed β
π Read
via "Threatpost".
The flaw was recently patched in Android's February Security Bulletin.π Read
via "Threatpost".
Threat Post
Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed
The flaw was recently patched in Android's February Security Bulletin.
π΄ Google Takeout Serves Up Video Files to Strangers π΄
π Read
via "Dark Reading: ".
A limited number of user videos were shared with others in a five-day incident from November.π Read
via "Dark Reading: ".
Dark Reading
Google Takeout Serves Up Video Files to Strangers
A limited number of user videos were shared with others in a five-day incident from November.
β Wacom Tablet Data Exfiltration Raises Security Concerns β
π Read
via "Threatpost".
Wacom stated that its data collection is done only in aggregate -- but that doesn't fix the issues, according to security experts.π Read
via "Threatpost".
Threat Post
Wacom Tablet Data Exfiltration Raises Security Concerns
Wacom stated that its data collection is done only in aggregate β but that doesn't fix the issues, according to security experts.
ATENTIONβΌ New - CVE-2011-1086
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in admin/system.html in Openfiler 2.3 allows remote attackers to inject arbitrary web script or HTML via the device parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1085
π Read
via "National Vulnerability Database".
CSRF vulnerability in Smoothwall Express 3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1084
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Smoothwall Express 3.π Read
via "National Vulnerability Database".
π The most overhyped, and most significant, tech trends of 2020 π
π Read
via "Security on TechRepublic".
A survey of IT professionals finds AR and 5G bust for 2020, machine learning and DevOps on top.π Read
via "Security on TechRepublic".
TechRepublic
The most overhyped, and most significant, tech trends of 2020
A survey of IT professionals finds AR and 5G bust for 2020, machine learning and DevOps on top.
π How to protect your privacy on an iOS device π
π Read
via "Security on TechRepublic".
Learn how to keep your iOS devices--and your data--secure with these iOS 13 privacy settings and Apple resources.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your privacy on an iOS device
Learn how to keep your iOS devices--and your data--secure with these iOS 13 privacy settings and Apple resources.
ATENTIONβΌ New - CVE-2011-3642
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in Flowplayer Flash 3.2.7 through 3.2.16, as used in the News system (news) extension for TYPO3 and Mahara, allows remote attackers to inject arbitrary web script or HTML via the plugin configuration directive in a reference to an external domain plugin.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-4381
π Read
via "National Vulnerability Database".
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-4029
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in main/dropbox/index.php in Chamilo LMS before 1.8.8.6 allows remote attackers to inject arbitrary web script or HTML via the category_name parameter in an addsentcategory action.π Read
via "National Vulnerability Database".
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From Google's OpenSK project to Apple's SMS 2FA proposal, and everything in between. Get up to date with the hot stories of the last week.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From Googleβs OpenSK project to Appleβs SMS 2FA proposal, and everything in between. Get up to date with the hot stories of the last week.
β Frustrated author cybersquats novelistβs website β
π Read
via "Naked Security".
If you visit the website of renowned Canadian novelist Patrick deWitt today, you'll see a surprising message. "THIS IS NOT PATRICK DEWITT", it says.π Read
via "Naked Security".
Naked Security
Frustrated author cybersquats novelistβs website
If you visit the website of renowned Canadian novelist Patrick deWitt today, youβll see a surprising message. βTHIS IS NOT PATRICK DEWITTβ, it says.
β FBI director warns of sustained Russian disinformation threat β
π Read
via "Naked Security".
Russia is still using social media in a sustained campaign to dabble in US affairs, according to FBI director Chris Wray.π Read
via "Naked Security".
Naked Security
FBI director warns of sustained Russian disinformation threat
Russia is still using social media in a sustained campaign to dabble in US affairs, according to FBI director Chris Wray.