Cybersecurity News
Week in security with Tony Anscombe
Microsoft plugs a serious hole in Windows – Your options after Windows 7 end of life – iPhones as security keys for Google accounts
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
JhoneRAT exploits cloud services to attack Middle Eastern countries
Google Drive, Twitter, ImgBB and Google Forms are being abused in the name of data theft.FBI shuts down website selling billions of stolen records
A subscription to the trove of personal details could be had for as little as $2
The post FBI shuts down website selling billions of stolen records appeared first on WeLiveSecurity
FBI shuts down website selling billions of stolen records
A subscription to the trove of personal details could be had for as little as $2
The post FBI shuts down website selling billions of stolen records appeared first on WeLiveSecurity
WordPress plugin vulnerability can be exploited for total website takeover
The “easily exploitable” bug in WP Database Reset has serious consequences for webmasters.A hacker is patching Citrix servers to maintain exclusive access
FireEye believes this is a bad guy hoarding Citrix servers, rather than a good-guy vigilante looking out for organizations.EU considers banning facial recognition technology in public spaces
A potential ban could last for five years to allow lawmakers to catch up.FBI seizes WeLeakInfo, a website that sold access breached data
WeLeakInfo website sold access to more than 12 billion user records that leaked from breaches at other online services.Social Media Privacy Settings
Privacy settings on social networks have limited value. They are confusing to configure and change often. Ultimately, if you do not want your parents or boss reading it, do not post it.With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses

New Attack Campaigns Suggest Emotet Threat Is Far From Over
Malware described by the DHS as among the worst ever continues to evolve and grow, researchers from Cisco Talos, Cofense, and Check Point Software say.Critical Cisco Flaws Now Have PoC Exploit

Google Account Security Keys Launch for iPhone

FBI: Nation-state actors have breached two US municipalities
The SharePoint CVE-2019-0604 vulnerability has been one of the most targeted security flawPhishing Today, Deepfakes Tomorrow: Training Employees to Spot This Emerging Threat
Cybercriminals are evolving their tactics, and the security community anticipates voice and video fraud to play a role in one of the next big data breaches -- so start protecting your business now.Satan Ransomware Reborn to Torment Businesses

You can now turn your iPhone into a Google security key
And it doesn’t require much more than downloading a dedicated app
The post You can now turn your iPhone into a Google security key appeared first on WeLiveSecurity
You can now turn your iPhone into a Google security key
And it doesn’t require much more than downloading a dedicated app
The post You can now turn your iPhone into a Google security key appeared first on WeLiveSecurity