Peekaboo Moments baby-recording app has a bad database booboo

Credit to Author: Lisa Vaas| Date: Wed, 15 Jan 2020 11:05:46 +0000

No need to wait until you’ve gurgled out of your mother’s womb to experience the joys of having your privacy breached.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/s_aas9nhhmI” height=”1″ width=”1″ alt=””/>

Read more

Compiling Open Source Threat Intelligence for Threat Hunts

Credit to Author: Mat Gangwer| Date: Wed, 15 Jan 2020 10:02:05 +0000

In addition to normal tradecraft adaptations, any time a change in the geopolitical landscape takes place, cyberattack campaigns and adversary behaviors typically shift as well. The recent events with Iran and the United States offer a relevant use case for organizations and have highlighted the benefit of having a threat intelligence driven hunting process. The [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/SIgRbmduM5E” height=”1″ width=”1″ alt=””/>

Read more

High-profile events are opportunities to determine security readiness

Credit to Author: Chester Wisniewski| Date: Wed, 15 Jan 2020 10:00:38 +0000

While the likelihood you might be targeted by a nation-state is low, preparing for such a circumstance might still be a useful strategy<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/mlgSNlflJNI” height=”1″ width=”1″ alt=””/>

Read more

Apple says no to unlocking shooter’s phone; AG and Trump lash back

Credit to Author: Lisa Vaas| Date: Wed, 15 Jan 2020 10:52:19 +0000

Attorney General Barr and President Trump are demanding Apple unlock the mass shooter’s iPhone. Apple replies: You can’t break just 1 phone.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ZRh0_aJQATA” height=”1″ width=”1″ alt=””/>

Read more

Rethinking cyber scenarios—learning (and training) as you defend

Credit to Author: Elizabeth Wolk| Date: Tue, 14 Jan 2020 17:00:55 +0000

Gamified cybersecurity learning is an increasingly important must-have in your SecOps program, from understanding basic concepts all the way into advanced attacker and defense scenarios. Microsoft and Circadence are working together to democratize and scale cyber readiness globally.

The post Rethinking cyber scenarios—learning (and training) as you defend appeared first on Microsoft Security.

Read more

El talón de Aquiles de la próxima generación de firewalls

Credit to Author: Sophos Iberia| Date: Tue, 14 Jan 2020 09:13:32 +0000

Para comprender mejor las realidades de la seguridad de la red en la actualidad, Sophos encargó a Vanson Bourne, especialista en investigación, que realizara una encuesta independiente entre 3.100 responsables de TI en 12 países y seis continentes. Los resultados arrojan nueva luz sobre la realidad en la práctica de la seguridad de red actual [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/AVGzhBDTRCU” height=”1″ width=”1″ alt=””/>

Read more

Patch Tuesday, January 2020 Edition

Credit to Author: BrianKrebs| Date: Wed, 15 Jan 2020 02:31:50 +0000

Microsoft today released updates to plug 50 security holes in various flavors of Windows and related software. The patch batch includes a fix for a flaw in Windows 10 and server equivalents of this operating system that prompted an unprecedented public warning from the U.S. National Security Agency. This month also marks the end of mainstream support for Windows 7, a still broadly-used operating system that will no longer be supplied with security updates.

Read more

Microsoft to Windows 7: Beat it, you bum

Credit to Author: Gregg Keizer| Date: Tue, 14 Jan 2020 12:36:00 -0800

Microsoft today figuratively told Window 7 – which ended support with a final security update – not to let the door hit it on the way out.

“Ten-year-old tech just can’t keep up,” Jared Spataro, an executive on the Microsoft 365 team, wrote in a post to a company blog. “As we end support for Windows 7, I encourage you to transition to these newer options right away.”

Not surprisingly, Spataro named those newer options as Windows 10 to replace Windows 7, and Office 365 to fill in for the retiring-in-October Office 2010. Combined, they make up the bulk of Microsoft 365, the business subscription plan Microsoft wants all customers to adopt.

To read this article in full, please click here

Read more