β Apple iPhone Users Targeted with Bogus Dating App for Valentineβs Day β
π Read
via "Threatpost".
The scam uses a range of themes, including tech-support scares and slot machines.π Read
via "Threatpost".
Threat Post
Apple iPhone Users Targeted with Bogus Dating App for Valentineβs Day
The scam uses a range of themes, including tech-support scares and slot machines.
π΄ Palm Beach Elections Office Hit with Ransomware Pre-2016 Election π΄
π Read
via "Dark Reading: ".
Palm Beach County's elections supervisor does not believe the attack is linked to Russian hacking attempts targeting Florida.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
π Voatz defends blockchain solution for its voting via app π
π Read
via "Security on TechRepublic".
The for-profit company wants to make absentee voting easier for members of the military, people with disabilities, and older adults, but its biggest test included only 15,000 voters.π Read
via "Security on TechRepublic".
TechRepublic
Voatz defends blockchain solution for its voting via app
The for-profit company wants to make absentee voting easier for members of the military, people with disabilities, and older adults, but its biggest test included only 15,000 voters.
π MIT finds massive security flaws with blockchain voting app π
π Read
via "Security on TechRepublic".
Researchers say hackers can alter, stop, or expose how an individual user has voted through the Voatz app.π Read
via "Security on TechRepublic".
TechRepublic
MIT finds massive security flaws with blockchain voting app
Researchers say hackers can alter, stop, or expose how an individual user has voted through the Voatz app.
β 500 Malicious Chrome Extensions Impact Millions of Users β
π Read
via "Threatpost".
The malicious Chrome extensions were secretly collecting users' browser data and redirecting them to malware-laced websites.π Read
via "Threatpost".
Threat Post
500 Malicious Chrome Extensions Impact Millions of Users
The malicious Chrome extensions were secretly collecting users' browser data and redirecting them to malware-laced websites.
β Huawei Controversy Highlights 5G Security Implications β
π Read
via "Threatpost".
Security experts say that 5G supply chain concerns should be taken seriously β whether itβs in the context of Huawei or not.π Read
via "Threatpost".
Threat Post
Huawei Controversy Highlights 5G Security Implications
Security experts say that 5G supply chain concerns should be taken seriously β whether itβs in the context of Huawei or not.
π΄ Phishing Campaign Targets Mobile Banking Users π΄
π Read
via "Dark Reading: ".
Consumers in dozens of countries were targeted, Lookout says.π Read
via "Dark Reading: ".
Dark Reading
Phishing Campaign Targets Mobile Banking Users
Consumers in dozens of countries were targeted, Lookout says.
π΄ Martin and Dorothie Hellman on Love, Crypto & Saving the World π΄
π Read
via "Dark Reading: ".
Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.π Read
via "Dark Reading: ".
Dark Reading
Martin and Dorothie Hellman on Love, Crypto & Saving the World
Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.
β Monday review β the hot 24 stories of the week β
π Read
via "Naked Security".
Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 24 stories of the week
Get yourself up to date with everything we've written in the last seven days β it's weekly roundup time.
β Police bust alleged operator of Bitcoin mixing service Helix β
π Read
via "Naked Security".
The Ohio man is charged with running a Bitcoin mixer to launder over $300mβnow worth $3.6bβon behalf of Dark Net crooks trying to hide out.π Read
via "Naked Security".
Naked Security
Police bust alleged operator of Bitcoin mixing service Helix
The Ohio man is charged with running a Bitcoin mixer to launder over $300mβnow worth $3.6bβon behalf of Dark Net crooks trying to hide out.
β Senator calls for dedicated US data protection agency β
π Read
via "Naked Security".
The US needs a data protection agency of its own, and Kirsten Gillibrand wants to be the one that makes it happen.π Read
via "Naked Security".
Naked Security
Senator calls for dedicated US data protection agency
The US needs a data protection agency of its own, and Kirsten Gillibrand wants to be the one that makes it happen.
β Google forced to reveal anonymous reviewerβs details β
π Read
via "Naked Security".
A court has forced Google to reveal the details of an anonymous poster who published an unpalatable review of a dentist.π Read
via "Naked Security".
Naked Security
Google forced to reveal anonymous reviewerβs details
A court has forced Google to reveal the details of an anonymous poster who published an unpalatable review of a dentist.
β Google pulls 500 malicious Chrome extensions after researcher tip-off β
π Read
via "Naked Security".
Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising.π Read
via "Naked Security".
Naked Security
Google pulls 500 malicious Chrome extensions after researcher tip-off
Google has abruptly pulled over 500 Chrome extensions from its Web Store that researchers discovered were stealing browsing data and executing click fraud and malvertising.
ATENTIONβΌ New - CVE-2013-3738
π Read
via "National Vulnerability Database".
A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.π Read
via "National Vulnerability Database".
π How to report a phishing or spam email to Microsoft π
π Read
via "Security on TechRepublic".
Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters.π Read
via "Security on TechRepublic".
TechRepublic
How to report a phishing or spam email to Microsoft
Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters.
π OpenSSH 8.2p1 π
π Go!
via "Security Tool Files β Packet Storm".
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
OpenSSH 8.2p1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ATENTIONβΌ New - CVE-2013-3722
π Read
via "National Vulnerability Database".
A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-2412
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4531. Reason: This candidate is a duplicate of CVE-2012-4531. Notes: All CVE users should reference CVE-2012-4531 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
β Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs β
π Read
via "Threatpost".
A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.π Read
via "Threatpost".
Threat Post
Lenovo, HP, Dell Peripherals Face Unpatched Firmware Bugs
A lack of proper code-signing verification and authentication for firmware updates opens the door to information disclosure, remote code execution, denial of service and more.
β Sensitive plastic surgery images exposed online β
π Read
via "Naked Security".
Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.π Read
via "Naked Security".
Naked Security
Sensitive plastic surgery images exposed online
Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.
β IOTA shuts down network temporarily to fight wallet hacker β
π Read
via "Naked Security".
Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.π Read
via "Naked Security".
Naked Security
IOTA shuts down network temporarily to fight wallet hacker
Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.