Tue.Dec 25, 2018

article thumbnail

Over 19,000 Orange Livebox ADSL modems leak WiFi credentials

Security Affairs

Threat actors are attempting to exploit a flaw in Orange LiveBox ADSL modems to retrieve their SSID and WiFi password in plaintext. Threat actors in the wild are attempting to exploit a vulnerability in LiveBox ADSL modems from Orange, the issue could be triggered to retrieve their SSID and WiFi password in plaintext by simply sending a request to the devices.

article thumbnail

2019: The Year Ahead in Cybersecurity

Threatpost

What are the top cyber trends to watch out for in 2019? Here's what we're hearing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Die Hard is a Movie About Building Automation Insecurity. Discuss.

The Security Ledger

In this episode of the Security Ledger Podcast (#126): Die Hard has finally been embraced as the bloody, violent, feel-good Christmas movie its always been. But the film, which turns 30 this year, is about more than the power of ordinary guys to stand up to evil. Did you know it's also a (very) early warning about the dire insecurity of building. Read the whole entry. » Related Stories Spotlight: as Attacks Mount, how to secure the Industrial Internet Podcast Episode 123: HaveIBeenPwnedR

IoT 40
article thumbnail

IG GURU® and Inside the Records Room Partner In Delivering News Related To The IG and RIM Industries

IG Guru

Press Release December 12th, 2018 IG GURU® and Inside the Records Room Partner In Delivering News Related To The IG and RIM Industries IG GURU® recently took responsibility for the RIM Listserv community. They have expanded the forum into multiple sub-forums to include news, events, jobs, and a marketplace. Their vendor friendly approach has […].

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hackers launched phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale

Security Affairs

Amnesty International warns of threat actors that are launching phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale. Amnesty International published a report that details how threat actors are able to bypass 2FA authentication that leverages text message as a second factor. Attackers are using this tactic to break into Gmail and Yahoo accounts in large scale attacks. 2FA processes that are based on a text message are very popular because they are simple to use.

Phishing 100