Tweetovi

Blokirali ste korisnika/cu @phisherman_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @phisherman_

  1. prije 18 sati

    Hackers Exploited Twitter Bug to Find Linked Phone Numbers of Users: Twitter today issued a warning revealing that attackers abused a legitimate functionality on its platform to unauthorizedly determine phone numbers associated with millions of its…

    Poništi
  2. prije 18 sati

    Google's OpenSK lets you BYOSK – burn your own security key: Now there's no excuse OpenSK, a new open-source project from Google, lets folk make their own security key for less than £10.…

    Poništi
  3. prije 21 sat

    'Cyber security incident' takes its Toll on Aussie delivery giant as box-tracking boxen yanked offline: IT services offline for days now Australian courier company Toll has shut down several of its key systems after a "security incident" last week,…

    Poništi
  4. 3. velj

    Cover for 'cyber' attacks is risky, complex and people don't trust us, moan insurers: Tried not suing your customers when they make claims? FIC 2020  EU companies aren't taking out insurance against attacks on online assets because the companies selling…

    Poništi
  5. 3. velj

    WannaCry ransomware attack on NHS could have triggered NATO reaction, says German cybergeneral: Top military officers talk about response thresholds at French shindig FIC 2020  Western military alliance NATO could have reacted with force to the 2017…

    Poništi
  6. 3. velj

    Flaws punched holes in Azure cloud, Apple patches pretty much everything, Eurocops cuff Maltese hackers, etc: Also, Wawa data surfaces on dark markets after December's hack Roundup  It has been a busy week in infosec, though here's a few more security…

    Poništi
  7. 1. velj

    What It's Like to Be a CISO: Check Point Security Leader Weighs In: Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software.

    Poništi
  8. 1. velj
    Poništi
  9. 31. sij

    Remember those infosec fellas who were cuffed while testing the physical security of a courthouse? The burglary charges have been dropped: And it only took, er, four and a half months for people to see sense Criminal charges have been dropped against two…

    Poništi
  10. 31. sij

    Attempts to define international infosec rules of the road bogged down by endless talkshops, warn diplomats: Do you want Russia or China writing treaties on what's cool online? FIC 2020  International progress on state-level so-called cybersecurity…

    Poništi
  11. 31. sij

    How To Keep Your Privacy and Data Secure While Working With a Remote Team: Implementing basic strategies can ensure your remote team's work will be secure, data will be protected, and you'll be far less exposed to security risks.

    Poništi
  12. 30. sij

    United Nations Data Breach Started with Microsoft SharePoint Bug: A remote code execution flaw enabled a breach of UN offices in Geneva and Vienna, as well as the Office of the High Commissioner for Human Rights.

    Poništi
  13. 30. sij

    Anatomy of OpenBSD's OpenSMTPD hijack hole: How a malicious sender address can lead to remote pwnage: Function accidentally returns OK instead of no-way Code dive  The OpenBSD project's OpenSMTPD can be potentially hijacked by a maliciously crafted…

    Poništi
  14. 30. sij

    UN didn't patch SharePoint, got mega-hacked, covered it up, kept most staff in the dark, finally forced to admit it: For an organization accused of being 'all talk, no action', there's not even enough talking – to its own employees The United Nations’…

    Poništi
  15. 29. sij

    How to Clear Data Facebook Collects About You from Other Sites and Apps: Facebook is one of the world's biggest advertising platforms, and that's because it knows a lot about you, me, and everyone. Facebook uses many tools to track people across the…

    Poništi
  16. 29. sij

    Dear friends in DevSecOps: Don't forget, security is your responsibility, too – now learn how to do it right: Tune in to hear from Veracode on how to stay secure Webcast  What is DevSecOps? Simply put, it is the merging of DevOps and security processes…

    Poništi
  17. 29. sij

    Cache flow problems continue for Intel: Yet more data-leaking processor design blunders discovered, patches due soon: Cache(me)Out(side), how 'bout dat? Intel on Monday issued a processor data leakage advisory, describing two chip architecture flaws, one…

    Poništi
  18. 28. sij

    Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled: How about that antivirus now, huh? DEF CON is cancelled. For real this time. DEF CON China, that is.…

    Poništi
  19. 28. sij

    New 'CacheOut' Attack Leaks Data from Intel CPUs, VMs and SGX Enclave: Another month, another speculative execution vulnerability found in Intel processors. If your computer is running any modern Intel CPU built before October 2018, it's likely…

    Poništi
  20. 28. sij

    Zoom Bug Could Have Let Uninvited People Join Private Meetings: If you use Zoom to host your remote online meetings, you need to read this piece carefully. The massively popular video conferencing software has patched a security loophole that could have…

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·