π΄ RobbinHood Kills Security Processes Before Dropping Ransomware π΄
π Read
via "Dark Reading: ".
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.π Read
via "Dark Reading: ".
Darkreading
RobbinHood Kills Security Processes Before Dropping Ransomware
Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.
π How to use 7zip to encrypt files π
π Read
via "Security on TechRepublic".
If you need strong command line encryption on Linux, look no further than 7zip.π Read
via "Security on TechRepublic".
TechRepublic
How to use 7zip to encrypt files | TechRepublic
If you need strong command line encryption on Linux, look no further than 7zip.
π΄ CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten' π΄
π Read
via "Dark Reading: ".
Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.π Read
via "Dark Reading: ".
Dark Reading
CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten'
Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.
β Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed β
π Read
via "Threatpost".
The flaw was recently patched in Android's February Security Bulletin.π Read
via "Threatpost".
Threat Post
Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed
The flaw was recently patched in Android's February Security Bulletin.
π΄ Google Takeout Serves Up Video Files to Strangers π΄
π Read
via "Dark Reading: ".
A limited number of user videos were shared with others in a five-day incident from November.π Read
via "Dark Reading: ".
Dark Reading
Google Takeout Serves Up Video Files to Strangers
A limited number of user videos were shared with others in a five-day incident from November.
β Wacom Tablet Data Exfiltration Raises Security Concerns β
π Read
via "Threatpost".
Wacom stated that its data collection is done only in aggregate -- but that doesn't fix the issues, according to security experts.π Read
via "Threatpost".
Threat Post
Wacom Tablet Data Exfiltration Raises Security Concerns
Wacom stated that its data collection is done only in aggregate β but that doesn't fix the issues, according to security experts.
ATENTIONβΌ New - CVE-2011-1086
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in admin/system.html in Openfiler 2.3 allows remote attackers to inject arbitrary web script or HTML via the device parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1085
π Read
via "National Vulnerability Database".
CSRF vulnerability in Smoothwall Express 3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1084
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Smoothwall Express 3.π Read
via "National Vulnerability Database".
π The most overhyped, and most significant, tech trends of 2020 π
π Read
via "Security on TechRepublic".
A survey of IT professionals finds AR and 5G bust for 2020, machine learning and DevOps on top.π Read
via "Security on TechRepublic".
TechRepublic
The most overhyped, and most significant, tech trends of 2020
A survey of IT professionals finds AR and 5G bust for 2020, machine learning and DevOps on top.
π How to protect your privacy on an iOS device π
π Read
via "Security on TechRepublic".
Learn how to keep your iOS devices--and your data--secure with these iOS 13 privacy settings and Apple resources.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your privacy on an iOS device
Learn how to keep your iOS devices--and your data--secure with these iOS 13 privacy settings and Apple resources.
ATENTIONβΌ New - CVE-2011-3642
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in Flowplayer Flash 3.2.7 through 3.2.16, as used in the News system (news) extension for TYPO3 and Mahara, allows remote attackers to inject arbitrary web script or HTML via the plugin configuration directive in a reference to an external domain plugin.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-4381
π Read
via "National Vulnerability Database".
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-4029
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in main/dropbox/index.php in Chamilo LMS before 1.8.8.6 allows remote attackers to inject arbitrary web script or HTML via the category_name parameter in an addsentcategory action.π Read
via "National Vulnerability Database".
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From Google's OpenSK project to Apple's SMS 2FA proposal, and everything in between. Get up to date with the hot stories of the last week.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From Googleβs OpenSK project to Appleβs SMS 2FA proposal, and everything in between. Get up to date with the hot stories of the last week.
β Frustrated author cybersquats novelistβs website β
π Read
via "Naked Security".
If you visit the website of renowned Canadian novelist Patrick deWitt today, you'll see a surprising message. "THIS IS NOT PATRICK DEWITT", it says.π Read
via "Naked Security".
Naked Security
Frustrated author cybersquats novelistβs website
If you visit the website of renowned Canadian novelist Patrick deWitt today, youβll see a surprising message. βTHIS IS NOT PATRICK DEWITTβ, it says.
β FBI director warns of sustained Russian disinformation threat β
π Read
via "Naked Security".
Russia is still using social media in a sustained campaign to dabble in US affairs, according to FBI director Chris Wray.π Read
via "Naked Security".
Naked Security
FBI director warns of sustained Russian disinformation threat
Russia is still using social media in a sustained campaign to dabble in US affairs, according to FBI director Chris Wray.
β Facebook encrypted messaging will βcreate hiding places for child abuseβ β
π Read
via "Naked Security".
Child safety groups penned an open letter to Facebook, urging a delay on encrypted messaging until sufficient safeguards are in place.π Read
via "Naked Security".
Naked Security
Facebook encrypted messaging will βcreate hiding places for child abuseβ
Child safety groups penned an open letter to Facebook, urging a delay on encrypted messaging until sufficient safeguards are in place.
β Google Chrome to start blocking downloads served via HTTP β
π Read
via "Naked Security".
Google has announced a timetable for phasing out insecure file downloads in the Chrome browser starting with desktop version 81 due next month.π Read
via "Naked Security".
Naked Security
Google Chrome to start blocking downloads served via HTTP
Google has announced a timetable for phasing out insecure file downloads in the Chrome browser starting with desktop version 81 due next month.
π΄ Day in the Life of a Bot π΄
π Read
via "Dark Reading: ".
A typical workday for a bot, from its own point of view.π Read
via "Dark Reading: ".
Darkreading
Day in the Life of a Bot
A typical workday for a bot, from its own point of view.
β Emotet Now Hacks Nearby Wi-Fi Networks to Spread Like a Worm β
π Read
via "Threatpost".
The new tactic used by Emotet allows the malware to infect nearby insecure Wi-Fi networks - and their devices - via brute force loops.π Read
via "Threatpost".
Threat Post
Emotet Now Hacks Nearby Wi-Fi Networks to Spread Like a Worm
The new tactic used by Emotet allows the malware to infect nearby insecure Wi-Fi networks - and their devices - via brute force loops.