β Sensitive plastic surgery images exposed online β
π Read
via "Naked Security".
Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.π Read
via "Naked Security".
Naked Security
Sensitive plastic surgery images exposed online
Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database.
β IOTA shuts down network temporarily to fight wallet hacker β
π Read
via "Naked Security".
Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.π Read
via "Naked Security".
Naked Security
IOTA shuts down network temporarily to fight wallet hacker
Popular cryptocurrency IOTA has temporarily shut down its entire network after a hacker stole funds from ten of its highest-value users.
β AI filter launched to block Twitter cyberflashing β
π Read
via "Naked Security".
A small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers.π Read
via "Naked Security".
Naked Security
AI filter launched to block Twitter cyberflashing
A small but determined group of Twitter users think it is a good idea to direct message (DM) pictures of male genitals to complete strangers.
β Council returns to using pen and paper after cyberattack β
π Read
via "Naked Security".
Ten days after a suspected ransomware attack, residents of the English borough of Redcar and Cleveland must be starting to wonder when their Councilβs IT systems will return.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Python, microservices, and more tech trends for 2020, according to O'Reilly π
π Read
via "Security on TechRepublic".
Interest in Kubernetes is increasing, and DevOps is losing steam, based on O'Reilly survey findings.π Read
via "Security on TechRepublic".
TechRepublic
Python, microservices, and more tech trends for 2020, according to O'Reilly
Interest in Kubernetes is increasing, and DevOps is losing steam, based on O'Reilly survey findings.
β Hacker Scheme Threatens AdSense Customers with Account Suspension β
π Read
via "Threatpost".
Scam threatens to flood sites using Googleβs banner-ad program with bot and junk traffic if owners donβt pay $5K in bitcoin.π Read
via "Threatpost".
Threat Post
Hacker Scheme Threatens AdSense Customers with Account Suspension
Scam threatens to flood sites using Googleβs banner-ad program with bot and junk traffic if owners donβt pay $5K in bitcoin.
π΄ 8 Things Users Do That Make Security Pros Miserable π΄
π Read
via "Dark Reading: ".
When a user interacts with an enterprise system the result can be productivity or disaster. Here are 8 opportunities for the disaster side to win out over the productive.π Read
via "Dark Reading: ".
Darkreading
8 Things Users Do That Make Security Pros Miserable
When a user interacts with an enterprise system, the result can be productivity or disaster. Here are eight opportunities for the disaster side to win out over the productive.
π΄ Staircase to the Cloud: Dark Reading Caption Contest Winners π΄
π Read
via "Dark Reading: ".
A humorous nod to the lack of gender equity in cybersecurity hiring was our judges' unanimous choice. And the winners are ...π Read
via "Dark Reading: ".
Dark Reading
Staircase to the Cloud: Dark Reading Caption Contest Winners
A humorous nod to the lack of gender equity in cybersecurity hiring was our judges' unanimous choice. And the winners are ...
π΄ The Roads to Riches π΄
π Read
via "Dark Reading: ".
You could be making millions in just two years!π Read
via "Dark Reading: ".
Dark Reading
The Road(s) to Riches
You could be making millions in just two years!
β Malware and HTTPS β a growing love affair β
π Read
via "Naked Security".
HTTPS web encryption - blessing or curse? A new SophosLabs report looks at how much the crooks love TLS.π Read
via "Naked Security".
Naked Security
Malware and HTTPS β a growing love affair
HTTPS web encryption β blessing or curse? A new SophosLabs report looks at how much the crooks love TLS.
π΄ The Road(s) to Riches π΄
π Read
via "Dark Reading: ".
You could be making millions in just two years!π Read
via "Dark Reading: ".
Dark Reading
The Road(s) to Riches
You could be making millions in just two years!
π΄ Firmware Weaknesses Can Turn Computer Subsystems into Trojans π΄
π Read
via "Dark Reading: ".
Network cards, video cameras, and graphics adapters are a few of the subsystems whose lack of security could allow attackers to turn them into spy implants.π Read
via "Dark Reading: ".
Darkreading
Firmware Weaknesses Can Turn Computer Subsystems into Trojans
Network cards, video cameras, and graphics adapters are a few of the subsystems whose lack of security could allow attackers to turn them into spy implants.
π Mac attacks on the rise π
π Read
via "Security on TechRepublic".
Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report.π Read
via "Security on TechRepublic".
TechRepublic
Mac attacks on the rise
Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report.
π Lulzbuster 1.2.0 π
π Go!
via "Security Tool Files β Packet Storm".
Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Lulzbuster 1.2.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π OpenDNSSEC 2.1.6 π
π Go!
via "Security Tool Files β Packet Storm".
OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
OpenDNSSEC 2.1.6 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ATENTIONβΌ New - CVE-2013-5594
π Read
via "National Vulnerability Database".
Mozilla Firefox before 25 allows modification of anonymous content of pluginProblem.xml bindingπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4454
π Read
via "National Vulnerability Database".
WordPress Portable phpMyAdmin Plugin 1.4.1 has Multiple Security Bypass Vulnerabilitiesπ Read
via "National Vulnerability Database".
π΄ 1.7M Nedbank Customers Affected via Third-Party Breach π΄
π Read
via "Dark Reading: ".
A vulnerability in the network of marketing contractor Computer Facilities led to a breach at the South African bank.π Read
via "Dark Reading: ".
Darkreading
1.7M Nedbank Customers Affected via Third-Party Breach
A vulnerability in the network of marketing contractor Computer Facilities led to a breach at the South African bank.
β Active Exploits Hit Vulnerable WordPress ThemeGrill Plugin β
π Read
via "Threatpost".
Websites using a vulnerable version of the WordPress plugin, ThemeGrill Demo Importer, are being targeted by attackers.π Read
via "Threatpost".
Threat Post
Active Exploits Hit Vulnerable WordPress ThemeGrill Plugin
Websites using a vulnerable version of the WordPress plugin, ThemeGrill Demo Importer, are being targeted by attackers.
ATENTIONβΌ New - CVE-2013-4227
π Read
via "National Vulnerability Database".
Cross-site request forgery (CSRF) vulnerability in the persona_xsrf_token function in persona.module in the Mozilla Persona module 7.x-1.x before 7.x-1.11 for Drupal allows remote attackers to hijack the authentication of aribitrary users via a security token that is not a string data type.π Read
via "National Vulnerability Database".