Sun.Nov 04, 2018

Who’s In Your Online Shopping Cart?

Krebs on Security

Crooks who hack online merchants to steal payment card data are constantly coming up with crafty ways to hide their malicious code on Web sites. In Internet ages past, this often meant obfuscating it as giant blobs of gibberish text that was obvious even to the untrained eye.

Kraken ransomware 2.0 is available through the RaaS model

Security Affairs

The author of the infamous Kraken ransomware has released a new version of the malicious code and launched a RaaS distribution program on the Dark Web.

How to Control What Websites Can Do on Your Computer

WIRED Threat Level

If you're not careful, websites can grab all kinds of permissions you don't realize or intend. Take back control in your browser. Security

Apple T2 security chip in new MacBooks disconnects Microphone when lid is closed

Security Affairs

Apple has implemented a new feature to protect the privacy of its MacBooks users aimed at preventing malicious software from spying on them.

Georgia Secretary of State Brian Kemp Accuses Georgia Democrats of Hacking

WIRED Threat Level

Georgia's secretary of state is also its GOP gubernatorial candidate. And he just claimed that Democrats committed "cyber crimes.". Security

IT 79

PortSmash flaw in Hyper-Threading CPU could allow sensitive data theft

Security Affairs

PortSmash side-channel flaw that could be exploited with a timing attack to steal information from other processes running in the same CPU core. PortSmash is a new side-channel vulnerability that could be exploited with a timing attack to steal information from other processes running in the same CPU core with SMT/hyper-threading enabled.

Going Digital Virtual Event Speaker Sneak Peak Series: Rich Lauwers and Ryan Bazler

AIIM

Our third and final installment of our virtual event sneak peak is here. We are so close to unveiling “ Going Digital: Strategies for Digitalizing the Enterprise ”! Take a look at what you can look forward to: Another presenter we chatted with is Rich Lauwers of EIG, LLC.

More Trending

Managed Threat Hunting Bridges the Talent Gap

The Security Ledger

Skilled operators make all the difference in incident response and threat hunting. With talent scarce (and expensive), however, managed threat hunting teams may be worth a look, writes Scott Taschler of the firm Crowdstrike.

Results of the Microsoft Office 365 eDiscovery Challenge Survey: eDiscovery Trends

eDiscovery Daily

Remember the Microsoft Office 365 eDiscovery Challenge Survey that Tom O’Connor and Don Swanson were conducting? The results are in! The results were published on Bob Ambrogi’s LawSites blog last week.

A Primer on DNS and Security

PerezBox

If you’re reading this article you’ve interacted with DNS. In fact, you’d be hard pressed to spend any time online and not interact with DNS. Many of us spend very. Read More. The post A Primer on DNS and Security appeared first on PerezBox. Security End User Security Security Tools And Technology Web And Information Security

GE Aviation receives FAA approval to install 3D printed bracket on GEnx commercial airline engines

3ders

GE Additive and GE Aviation have announced that the Federal Aviation Administration (FAA) has given ‘change in design’ approval to replace a conventionally manufactured power door opening system (PDOS) bracket. 3D Printing Applications