🔏 New Bill Would Create Federal Data Protection Agency 🔏
📖 Read
via "Subscriber Blog RSS Feed ".
New legislation, introduced today, would give the agency authority to enforce data practices, launch investigations, and issue subpoenas.📖 Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
New Bill Would Create Federal Data Protection Agency
New legislation, introduced today, would give the agency authority to enforce data practices, launch investigations, and issue subpoenas.
❌ Privacy Experts Skeptical of Proposed Data Protection Agency ❌
📖 Read
via "Threatpost".
A new Data Protection Agency would overhaul federal regulation efforts around data privacy - but experts are skeptical that the U.S. government can get it right.📖 Read
via "Threatpost".
Threat Post
Privacy Experts Skeptical of Proposed Data Protection Agency
A new Data Protection Agency would overhaul federal regulation efforts around data privacy - but experts are skeptical that the U.S. government can get it right.
🔐 Report: 9 times out of 10, hackers can attack website visitors 🔐
📖 Read
via "Security on TechRepublic".
A Positive Technologies study finds 82% of web application vulnerabilities lie in the source code.📖 Read
via "Security on TechRepublic".
TechRepublic
Report: 9 times out of 10, hackers can attack website visitors
A Positive Technologies study finds 82% of web application vulnerabilities lie in the source code.
🕴 Apps Remain Favorite Mobile Attack Vector 🕴
📖 Read
via "Dark Reading: ".
Mobile apps are used in nearly 80% of attacks targeting mobile devices, followed by network and operating system attacks.📖 Read
via "Dark Reading: ".
Darkreading
Apps Remain Favorite Mobile Attack Vector
Mobile apps are used in nearly 80% of attacks targeting mobile devices, followed by network and operating system attacks.
🔐 Key components of the CEO's agenda for the digital enterprise 🔐
📖 Read
via "Security on TechRepublic".
CEOs are generally from a finance/business track, rather than a technology one--why their traditional agenda and practices must change.📖 Read
via "Security on TechRepublic".
TechRepublic
Key components of the CEO's agenda for the digital enterprise
CEOs are generally from a finance/business track, rather than a technology one--why their traditional agenda and practices must change.
🕴 Small Business Security: 5 Tips on How and Where to Start 🕴
📖 Read
via "Dark Reading: ".
There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better.📖 Read
via "Dark Reading: ".
Darkreading
Small Business Security: 5 Tips on How and Where to Start
There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better.
🕴 7 Tax Season Security Tips 🕴
📖 Read
via "Dark Reading: ".
Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.📖 Read
via "Dark Reading: ".
Dark Reading
7 Tax Season Security Tips
Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.
🔐 IoT device security: 5 tips for enterprises 🔐
📖 Read
via "Security on TechRepublic".
There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them.📖 Read
via "Security on TechRepublic".
TechRepublic
IoT device security: 5 tips for enterprises
There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them.
ATENTION‼ New - CVE-2012-1903
📖 Read
via "National Vulnerability Database".
XSS in Telligent Community 5.6.583.20496 via a flash file and related to the allowScriptAccess parameter.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2012-1500
📖 Read
via "National Vulnerability Database".
Stored XSS vulnerability in UpdateFieldJson.jspa in JIRA 4.4.3 and GreenHopper before 5.9.8 allows an attacker to inject arbitrary script code.📖 Read
via "National Vulnerability Database".
❌ Critical WordPress Plugin Bug Afflicts 700K Sites ❌
📖 Read
via "Threatpost".
Researchers are urging users of the GDPR Cookie Consent WordPress plugin to update as soon as possible.📖 Read
via "Threatpost".
Threat Post
Critical WordPress Plugin Bug Afflicts 700K Sites
Researchers are urging users of the GDPR Cookie Consent WordPress plugin to update as soon as possible.
🕴 Huawei Charged with RICO Violations in Federal Court 🕴
📖 Read
via "Dark Reading: ".
A new set of indictments adds conspiracy to violate RICO statutes to a list of existing charges against the Chinese telecommunications giant.📖 Read
via "Dark Reading: ".
Darkreading
Huawei Charged with RICO Violations in Federal Court
A new set of indictments adds conspiracy to violate RICO statutes to a list of existing charges against the Chinese telecommunications giant.
🕴 Babel of IoT Authentication Poses Security Challenges 🕴
📖 Read
via "Dark Reading: ".
With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.📖 Read
via "Dark Reading: ".
Dark Reading
Babel of IoT Authentication Poses Security Challenges
With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.
ATENTION‼ New - CVE-2012-5623
📖 Read
via "National Vulnerability Database".
Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.📖 Read
via "National Vulnerability Database".
🕴 Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems 🕴
📖 Read
via "Dark Reading: ".
The new threat model hones in on ML security at the design state.📖 Read
via "Dark Reading: ".
Dark Reading
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
The new threat model hones in on ML security at the design state.
🕴 DDoS Attacks Nearly Double Between Q4 2018 and Q4 2019 🕴
📖 Read
via "Dark Reading: ".
Peer-to-peer botnets, TCP reflection attacks, and increased activity on Sundays are three DDoS attack trends from last quarter.📖 Read
via "Dark Reading: ".
Darkreading
DDoS Attacks Nearly Double Between Q4 2018 and Q4 2019
Peer-to-peer botnets, TCP reflection attacks, and increased activity on Sundays are three DDoS attack trends from last quarter.
🔐 Man tries to sell Jimmy Wales on blockchain for Wikipedia's security problems--Wales doesn't buy it 🔐
📖 Read
via "Security on TechRepublic".
Commentary: It takes hubris to tell Jimmy Wales, the founder of Wikipedia, how to store data.📖 Read
via "Security on TechRepublic".
TechRepublic
Man tries to sell Jimmy Wales on blockchain for Wikipedia's security problems--Wales doesn't buy it
Commentary: It takes hubris to tell Jimmy Wales, the founder of Wikipedia, how to store data.
🕴 Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec 🕴
📖 Read
via "Dark Reading: ".
What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?📖 Read
via "Dark Reading: ".
Darkreading
Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec
What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?
⚠ Corp.com is up for sale – check your Active Directory settings! ⚠
📖 Read
via "Naked Security".
An old, dormant domain is going on sale - and the results could be catastrophic for enterprises with common Active Directory misconfigurations.📖 Read
via "Naked Security".
Naked Security
Corp.com is up for sale – check your Active Directory settings!
An old, dormant domain is going on sale – and the results could be catastrophic for enterprises with common Active Directory misconfigurations.
⚠ Self-driving car dataset missing labels for pedestrians, cyclists ⚠
📖 Read
via "Naked Security".
Udacity Dataset 2, used to train thousands of engineers, contained thousands of unlabeled vehicles and hundreds of unlabeled pedestrians.📖 Read
via "Naked Security".
Naked Security
Self-driving car dataset missing labels for pedestrians, cyclists
Udacity Dataset 2, used to train thousands of engineers, contained thousands of unlabeled vehicles and hundreds of unlabeled pedestrians.
⚠ Facebook ices in-app dating in EU after questions from regulator ⚠
📖 Read
via "Naked Security".
The app's rollout in the EU has been delayed until Facebook can show privacy regulators its data protection workings.📖 Read
via "Naked Security".
Naked Security
Facebook ices in-app dating in EU after questions from regulator
The app’s rollout in the EU has been delayed until Facebook can show privacy regulators its data protection workings.