π Finally, the world is getting concerned about data privacy π
π Read
via "Security on TechRepublic".
Consumers and employees are finally becoming more sensitive to the privacy of their data. As technology leaders it's worth getting ahead of this trend.π Read
via "Security on TechRepublic".
TechRepublic
Finally, the world is getting concerned about data privacy
Consumers and employees are finally becoming more sensitive to the privacy of their data. As technology leaders it's worth getting ahead of this trend.
β Ring Mandates 2FA After Rash of Hacks β
π Read
via "Threatpost".
Ring outlined new security and data privacy measures, Tuesday, following backlash of the connected doorbell in the past year.π Read
via "Threatpost".
Threat Post
Ring Mandates 2FA After Rash of Hacks
Ring outlined new security and data privacy measures, Tuesday, following backlash of the connected doorbell in the past year.
π Washington Privacy Act Clears Senate π
π Read
via "Subscriber Blog RSS Feed ".
Like other recent state data privacy laws, new legislation in Washington would require businesses to establish, implement, and maintain reasonable administrative, technical, and physical data security practices.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Washington Privacy Act Clears Senate
Like other recent state data privacy laws, new legislation in Washington would require businesses to establish, implement, and maintain reasonable administrative, technical, and physical data security practices.
ATENTIONβΌ New - CVE-2013-4228
π Read
via "National Vulnerability Database".
The OG access fields (visibility fields) implementation in Organic Groups (OG) module 7.x-2.x before 7.x-2.3 for Drupal does not properly restrict access to private groups, which allows remote authenticated users to guess node IDs, subscribe to, and read the content of arbitrary private groups via unspecified vectors.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-4226
π Read
via "National Vulnerability Database".
The Authenticated User Page Caching (Authcache) module 7.x-1.x before 7.x-1.5 for Drupal does not properly restrict access to cached pages, which allows remote attackers with the same role-combination as the superuser to obtain sensitive information via the cached pages of the superuser.π Read
via "National Vulnerability Database".
π΄ Dell Sells RSA to Private Equity Firm for $2.1B π΄
π Read
via "Dark Reading: ".
Deal with private equity entity Symphony Technology Group revealed one week before the security industry's RSA Conference in San Francisco.π Read
via "Dark Reading: ".
Dark Reading
Dell Sells RSA to Private Equity Firm for $2.1B
Deal with private equity entity Symphony Technology Group revealed one week before the security industry's RSA Conference in San Francisco.
β FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter β
π Read
via "Threatpost".
OurMine took over the Spanish powerhouse soccer team's Twitter account.π Read
via "Threatpost".
Threat Post
FC Barcelona Suffers Likely Credential-Stuffing Attack on Twitter
OurMine took over the Spanish powerhouse soccer team's Twitter account.
π΄ The Trouble with Free and Open Source Software π΄
π Read
via "Dark Reading: ".
Insecure developer accounts, legacy software, and nonstandard naming schemes are major problems, Linux Foundation and Harvard study concludes.π Read
via "Dark Reading: ".
Dark Reading
The Trouble with Free and Open Source Software
Insecure developer accounts, legacy software, and nonstandard naming schemes are major problems, Linux Foundation and Harvard study concludes.
ATENTIONβΌ New - CVE-2015-0749
π Read
via "National Vulnerability Database".
A vulnerability in Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected software. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-2054
π Read
via "National Vulnerability Database".
A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.π Read
via "National Vulnerability Database".
β OpenSSH eases admin hassles with FIDO U2F token support β
π Read
via "Naked Security".
OpenSSH version 8.2 is out and the big news is that the worldβs most popular remote management software now supports authentication using any FIDO (Fast Identity Online) U2F hardware token.π Read
via "Naked Security".
Naked Security
OpenSSH eases admin hassles with FIDO U2F token support
OpenSSH version 8.2 is out and the big news is that the worldβs most popular remote management software now supports authentication using any FIDO (Fast Identity Online) U2F hardware token.
β WordPress plugin hole could have allowed attackers to wipe websites β
π Read
via "Naked Security".
A WordPress plugin with over 100,000 active installations had a bug that could have allowed unauthorised attackers to wipe its users' blogs clean, it emerged this week.π Read
via "Naked Security".
Naked Security
WordPress plugin hole could have allowed attackers to wipe websites
A WordPress plugin with over 100,000 active installations had a bug that could have allowed unauthorised attackers to wipe its usersβ blogs clean, it emerged this week.
β Facebook asks to be regulated kinda like a newspaper, kinda like telco β
π Read
via "Naked Security".
Zuckerberg is in Brussels right in time for the European Commission's release of its manifesto on regulating AI.π Read
via "Naked Security".
Naked Security
Facebook asks to be regulated kinda like a newspaper, kinda like telco
Zuckerberg is in Brussels right in time for the European Commissionβs release of its manifesto on regulating AI.
β Private photos leaked by PhotoSquaredβs unsecured cloud storage β
π Read
via "Naked Security".
With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.π Read
via "Naked Security".
Naked Security
Private photos leaked by PhotoSquaredβs unsecured cloud storage
With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.
β Latest Tax Scams Target Apps and Tax-Prep Websites β
π Read
via "Threatpost".
Traditional e-mail based scams are also in the mix this year, one in particular that uses the legitimate app TeamViewer to take over victimsβ systems.π Read
via "Threatpost".
Threat Post
Latest Tax Scams Target Apps and Tax-Prep Websites
Traditional e-mail based scams are also in the mix this year, one in particular that uses the legitimate app TeamViewer to take over victimsβ systems.
π How to manage security and privacy in the new Microsoft Edge browser π
π Read
via "Security on TechRepublic".
There's a new version of Microsoft Edge in town based on Chromium. Here's how to manage the browser's security and privacy settings.π Read
via "Security on TechRepublic".
TechRepublic
How to manage security and privacy in the new Microsoft Edge browser
There's a new version of Microsoft Edge in town based on Chromium. Here's how to manage the browser's security and privacy settings.
β Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations β
π Read
via "Threatpost".
Cynet Free Threat Assessment spotlights critical, exposed attack surfaces and provides actionable knowledge of attacks that are currently alive and active.π Read
via "Threatpost".
Threat Post
Cynet Offers Free Threat Assessment for Mid-Sized and Large Organizations
Cynet Free Threat Assessment spotlights critical, exposed attack surfaces and provides actionable knowledge of attacks that are currently alive and active.
π΄ Don't Let Iowa Bring Our Elections Back to the Stone Age π΄
π Read
via "Dark Reading: ".
The voting experience should be the same whether the vote is in person, by mail, or over the Internet. Let's not allow one bad incident stop us from finding new ways to achieve this.π Read
via "Dark Reading: ".
Darkreading
Don't Let Iowa Bring Our Elections Back to the Stone Age
The voting experience should be the same whether the vote is in person, by mail, or over the Internet. Let's not allow one bad incident stop us from finding new ways to achieve this.
π Coronavirus domain names are the latest hacker trick π
π Read
via "Security on TechRepublic".
One site registered in Russia offers a coronavirus cure for $300.π Read
via "Security on TechRepublic".
TechRepublic
Coronavirus domain names are the latest hacker trick
One site registered in Russia offers a coronavirus cure for $300.
π Cybercriminals get creative with tax scams ahead of April 15 π
π Read
via "Security on TechRepublic".
Hackers are going after everyone this tax season, including the companies handling our most sensitive information.π Read
via "Security on TechRepublic".
TechRepublic
Cybercriminals get creative with tax scams ahead of April 15
Hackers are going after everyone this tax season, including the companies handling our most sensitive information.
π Insider data breach survey finds directors most likely to break company policy π
π Read
via "Security on TechRepublic".
Report suggests IT leaders think breaches are inevitable and don't have adequate risk management in place.π Read
via "Security on TechRepublic".
TechRepublic
Insider data breach survey finds directors most likely to break company policy
Report suggests IT leaders think breaches are inevitable and don't have adequate risk management in place.