Sun.Nov 04, 2018

Who’s In Your Online Shopping Cart?

Krebs on Security

Crooks who hack online merchants to steal payment card data are constantly coming up with crafty ways to hide their malicious code on Web sites. In Internet ages past, this often meant obfuscating it as giant blobs of gibberish text that was obvious even to the untrained eye.

Kraken ransomware 2.0 is available through the RaaS model

Security Affairs

The author of the infamous Kraken ransomware has released a new version of the malicious code and launched a RaaS distribution program on the Dark Web.

How to Control What Websites Can Do on Your Computer

WIRED Threat Level

If you're not careful, websites can grab all kinds of permissions you don't realize or intend. Take back control in your browser. Security

Apple T2 security chip in new MacBooks disconnects Microphone when lid is closed

Security Affairs

Apple has implemented a new feature to protect the privacy of its MacBooks users aimed at preventing malicious software from spying on them.

Georgia Secretary of State Brian Kemp Accuses Georgia Democrats of Hacking

WIRED Threat Level

Georgia's secretary of state is also its GOP gubernatorial candidate. And he just claimed that Democrats committed "cyber crimes.". Security

IT 76

PortSmash flaw in Hyper-Threading CPU could allow sensitive data theft

Security Affairs

PortSmash side-channel flaw that could be exploited with a timing attack to steal information from other processes running in the same CPU core. PortSmash is a new side-channel vulnerability that could be exploited with a timing attack to steal information from other processes running in the same CPU core with SMT/hyper-threading enabled.

More Trending

Security Affairs newsletter Round 187 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy.

Results of the Microsoft Office 365 eDiscovery Challenge Survey: eDiscovery Trends

eDiscovery Daily

Remember the Microsoft Office 365 eDiscovery Challenge Survey that Tom O’Connor and Don Swanson were conducting? The results are in! The results were published on Bob Ambrogi’s LawSites blog last week.

A Primer on DNS and Security


If you’re reading this article you’ve interacted with DNS. In fact, you’d be hard pressed to spend any time online and not interact with DNS. Many of us spend very. Read More. The post A Primer on DNS and Security appeared first on PerezBox. Security End User Security Security Tools And Technology Web And Information Security

Managed Threat Hunting Bridges the Talent Gap

The Security Ledger

Skilled operators make all the difference in incident response and threat hunting. With talent scarce (and expensive), however, managed threat hunting teams may be worth a look, writes Scott Taschler of the firm Crowdstrike.

GE Aviation receives FAA approval to install 3D printed bracket on GEnx commercial airline engines


GE Additive and GE Aviation have announced that the Federal Aviation Administration (FAA) has given ‘change in design’ approval to replace a conventionally manufactured power door opening system (PDOS) bracket. 3D Printing Applications