One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1008795
Date de publication 2019-01-25 14:00:00 (vue: 2019-01-25 16:02:06)
Titre Things I Hearted this Week, 25th January 2019
Texte And in what feels like a blink of an eye, January 2019 is almost over. Time sure does fly when you’re having fun. But we’re not here to have fun, this is a serious weekly roundup of all the security news and views, with a few cynical observations thrown in for good measure. Tables Turn on Journalists Colorado journalists on the crime beat are increasingly in the dark. More than two-dozen law enforcement agencies statewide have encrypted all of their radio communications, not just those related to surveillance or a special or sensitive operation. That means journalists and others can’t listen in using a scanner or smartphone app to learn about routine police calls. Law enforcement officials say that’s basically the point. Scanner technology has become more accessible through smartphone apps, and encryption has become easier and less expensive. Officials say that encrypting all radio communications is good for police safety and effectiveness, because suspects sometimes use scanners to evade or target officers, and good for the privacy of crime victims, whose personal information and location can go out over the radio. How long before journalists start touting, “If you’re innocent you have nothing to fear.” What would really be ironic is if journalists ask that police put backdoors into their comms so that journalists could listen in. Encryption efforts in Colorado challenge crime reporters, transparency | Columbia Journalism Review Would a Detection by Any Other Name Detect as Well? One detection category is not necessarily “better” than other categories. While detection categories and descriptions might lead one to think that certain categories are better, the category alone is not enough to give a complete picture of the detection. It’s important to look at the technique under test, the detection details, and what’s considered normal behavior in your organization’s environment to help you understand what detections are most useful to you. Part 1:Would a Detection by Any Other Name Detect as Well? | Frank Duff, Medium Breach of the Week Over 24 million financial and banking documents were found online by researcher Bob Diachenko as one does I suppose. The server, running an Elasticsearch database, had more than a decade’s worth of data, containing loan and mortgage agreements, repayment schedules and other highly sensitive financial and tax documents that reveal an intimate insight into a person’s financial life. Millions of bank loan and mortgage documents have leaked online | TechCrunch Voicemail Phishing Campaign Tricks You Into Verifying Password A new phishing campaign is underway that utilizes EML attachments that pretend to be a received voicemail and prompts you to login to retrieve it. This campaign also uses a clever tactic of tricking you into entering your password twice in order to confirm that you are providing the correct account credentials.
Envoyé Oui
Condensat “if 000 100 1:would 2016 2017 2018 2019 25th 265 300 about abuse accessible according account across actively agencies agreements all almost alone also americans any app apps are ask attachments average backdoors bank banking barker basically bay beat because become before behavior better big billion bleeping blink bob breach brought but called calls campaign campaigns can can’t categories category ceos certain challenge clever close colorado columbia come comms communications companies complete computer confirm considered containing correct could credentials crime cyber cybersecurity cynical daily dark data database deals decade’s dedicated demons descriptions despite details detect detection detections diachenko distribution documents does done double down dozen duff during easier effectiveness efforts elasticsearch eml encrypted encrypting encryption end enforcement engaged enough entering environment evade expensive eye fear feels fewer financial firm fly focused forbes fortune found four frank from front fun funding funneled give globe good guardian had happen has have having hearted help here highly hits how important increasingly information initiated innocent insight intimate investment ironic isn’t it’s january jessica journalism journalists just keep law lead leaked learn less life like listen loan location login long look madness make malicious malware managed march means measure medium might million millions more mortgage most much name necessarily networks new news non normal not nothing observations officers officials one online operation order organization organization’s other others out over part password people percent person’s personal phishing picture point police portfolio positivity possible pretend privacy profit project prompts protecting providing put radio really received recession record recorded related repayment reporters researcher researchers retrieve reveal review right roundup routine running safety say scanner scanners schedules screens security sensitive serious server sharing showcase smartphone sometimes sparta special spend start started statewide strategic submissions suppose sure surveillance suspects switzerland systems tables tactic take target tax tech techcrunch technique technology terrify test than that’s things think those through thrown time together touting transparency tricking tricks turn twice two under understand underway united urlhaus urls use used useful uses using utilizes ventures verifying victims views voicemail we’re websites week weekly well what what’s when whose will woman world worried worth would year you’re your
Tags Malware Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: