Top Cyber-security trends affecting Windows users during 2019

Credit to Author: Sushmita Kalashikar| Date: Thu, 19 Dec 2019 13:15:20 +0000

The year 2019 saw several new and recurring incidences of cyber-attacks, giving enterprises sleepless nights and the general public a run for security cover. However, there were a few trending malware that kept creating havoc and continued to keep the security experts on toes! Here’s a quick insight on few…

Read more

Chrome 79 patched after Android WebView app chaos

Credit to Author: John E Dunn| Date: Thu, 19 Dec 2019 12:01:28 +0000

Google has rushed out a fix for a bug in the Android version of Chrome that left some app users unable to access accounts or retrieve stored data.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/gdacxbn3fBw” height=”1″ width=”1″ alt=””/>

Read more

VPN Protocol Wars in the Blockchain World

Credit to Author: Guest Writer| Date: Thu, 19 Dec 2019 12:59:01 +0000

Placeholder VC partner Joel Monegro, in his formative article on value captured by protocols, explained that shared data layers in decentralized networks and limited supply cryptographic access tokens (i.e., cryptocurrencies) make blockchain protocols valuable and accessible for all. The proliferation of blockchains has led to an influx of these “fat” protocols, which are capturing more […]

VPN Protocol Wars in the Blockchain World was originally found on Cryptocurrency News | Tech, Privacy, Bitcoin & Blockchain | Blokt.

Read more

Get in line! 38,000 students and staff forced to queue for new passwords

Credit to Author: Lisa Vaas| Date: Thu, 19 Dec 2019 11:25:53 +0000

It’s not a bread line, and it’s not a line to see Santa – it’s an analog response to a nasty cyber attack.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Iubgv-x9nTA” height=”1″ width=”1″ alt=””/>

Read more

Proposed standard would make warrant canaries machine-readable

Credit to Author: Danny Bradbury| Date: Thu, 19 Dec 2019 11:20:22 +0000

For years, organisations have been using a common tactic called the warrant canary to warn people that the government has secretly demanded access to their private information. Now, a proposed standard could make this tool easier to use.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/CmOKFRN2Bk4″ height=”1″ width=”1″ alt=””/>

Read more

Instagram hides ‘false’ content, unless it’s from a politician

Credit to Author: Lisa Vaas| Date: Thu, 19 Dec 2019 10:50:00 +0000

Instagram’s expanding its fact-checking program but, like Facebook, says it won’t keep political speech away from “public debate and scrutiny.”<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/zAu2kI-UzaU” height=”1″ width=”1″ alt=””/>

Read more

Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks

Credit to Author: Eric Avena| Date: Wed, 18 Dec 2019 18:00:24 +0000

Microsoft Defender ATP data scientists and threat hunters collaborate to use a data science-driven approach to detecting RDP brute force attacks to protect customers against real-world threats.

The post Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks appeared first on Microsoft Security.

Read more