Found 37 bookmarks
Newest
Top 5 cybersecurity challenges in the hybrid office | 2021-06-16 | Security Magazine
Top 5 cybersecurity challenges in the hybrid office | 2021-06-16 | Security Magazine
The pandemic has caused a tectonic shift in how we live and work. Many companies are slowly returning to offices while an estimated 40% of the U.S. workforce continues to work remotely. A year into the pandemic and one thing is crystal clear, the future of work is hybrid. Regardless of whether employees are on-site or remote, this convenience is now a permanent cyber-risk for businesses.
·securitymagazine.com·
Top 5 cybersecurity challenges in the hybrid office | 2021-06-16 | Security Magazine
Microsoft Patches Six Zero-Day Security Holes – Krebs on Security
Microsoft Patches Six Zero-Day Security Holes – Krebs on Security
Microsoft today released another round of security updates for Windows operating systems and supported software, including fixes for six zero-day bugs that malicious hackers already are exploiting in active attacks. June’s Patch Tuesday addresses just 49 security holes — about half the normal number of vulnerabilities lately. But what this month lacks in volume it makes up for in urgency: Microsoft warns that bad guys are leveraging a half-dozen of those weaknesses to break into computers in targeted attacks.
·krebsonsecurity.com·
Microsoft Patches Six Zero-Day Security Holes – Krebs on Security
How to use authenticator apps like Google Authenticator to protect yourself online - Vox
How to use authenticator apps like Google Authenticator to protect yourself online - Vox
Text-based 2FA, where a text with a six-digit code is sent to your phone to verify your identity, is better known and better understood because it uses technology most of us use all the time anyway. But it’s a technology that wasn’t meant to serve as an identify verifier, and it’s an increasingly insecure option as hackers continue to find ways to exploit it. That’s why I recommend using an authenticator app, like Google Authenticator, instead. Don’t let the name intimidate you: There are a few extra steps involved, but the effort is worth it.
·vox.com·
How to use authenticator apps like Google Authenticator to protect yourself online - Vox
What is Social engineering? How Does it work? - CSN
What is Social engineering? How Does it work? - CSN
Social Engineering is a technique that is performed by cybercriminals who indulge in exploiting human weaknesses. The act of Social Engineering involves various techniques all of which involve the manipulation of human psychology.
·cybersecuritynews.com·
What is Social engineering? How Does it work? - CSN
Phish Leads to Breach at Calif. State Controller — Krebs on Security
Phish Leads to Breach at Calif. State Controller — Krebs on Security
A phishing attack last week gave attackers access to email and files at the California State Controller’s Office (SCO), an agency responsible for handling more than $100 billion in public funds each year...“This isn’t even the full extent of the breach,” said the California state employee, who spoke on condition of anonymity.
·krebsonsecurity.com·
Phish Leads to Breach at Calif. State Controller — Krebs on Security
Krebs on Security
Krebs on Security
Ne’er-do-wells leaked personal data — including phone numbers — for some 553 million Facebook users this week. Facebook says the data was collected before 2020 when it changed things to prevent such information from being scraped from profiles. The HaveIBeenPwned project, which collects and analyzes hundreds of database dumps containing information about billions of leaked accounts, has incorporated the data into his service.
·krebsonsecurity.com·
Krebs on Security
Google Warns Mac, Windows Users of Chrome Zero-Day Flaw | Threatpost
Google Warns Mac, Windows Users of Chrome Zero-Day Flaw | Threatpost
Google is hurrying out a fix for a vulnerability in its Chrome browser that’s under active attack – its third zero-day flaw so far this year. If exploited, the flaw could allow remote code-execution and denial-of-service attacks on affected systems.
·threatpost.com·
Google Warns Mac, Windows Users of Chrome Zero-Day Flaw | Threatpost
Cyberattacks Are Inevitable. Is Your Company Prepared?
Cyberattacks Are Inevitable. Is Your Company Prepared?
Cyberattacks always happen when you least expect them. And when they happen, they happen quickly. Responding appropriately is not just the responsibility of your cybersecurity team; everyone in the organization has a role to play.
·hbr.org·
Cyberattacks Are Inevitable. Is Your Company Prepared?
Microsoft Patch Tuesday Updates Fix 14 Critical Bugs | Threatpost
Microsoft Patch Tuesday Updates Fix 14 Critical Bugs | Threatpost
Microsoft has released its regularly scheduled March Patch Tuesday updates, which address 89 security vulnerabilities overall. Included in the slew are 14 critical flaws and 75 important-severity flaws. Microsoft also included five previously disclosed vulnerabilities, which are being actively exploited in the wild.
·threatpost.com·
Microsoft Patch Tuesday Updates Fix 14 Critical Bugs | Threatpost
Do I Need a VPN at Home? | PCMag
Do I Need a VPN at Home? | PCMag
Staying in is the most effective way to protect yourself during the pandemic, and that means a lot more time online at home. A VPN can help secure that critical connection.
·pcmag.com·
Do I Need a VPN at Home? | PCMag
A Private Alternative to Google Maps: DuckDuckGo Maps
A Private Alternative to Google Maps: DuckDuckGo Maps
DuckDuckGo isn’t just a private alternative to Google and Bing’s web search. It has a built-in online mapping solution designed with privacy in mind. If you want to leave Google, you don’t have to stick around for Google Maps.
·howtogeek.com·
A Private Alternative to Google Maps: DuckDuckGo Maps
Malformed URL Prefix Phishing Attacks Spike 6,000% | Threatpost
Malformed URL Prefix Phishing Attacks Spike 6,000% | Threatpost
“The URLs are malformed, not utilizing the normal URL protocols, such as http:// or https://,” researchers said in a blog post about their findings. “Instead, they use http:/\ in their URL prefix.”
·threatpost.com·
Malformed URL Prefix Phishing Attacks Spike 6,000% | Threatpost