One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 464011
Date de publication 2018-02-02 14:00:00 (vue: 2018-02-02 14:00:00)
Titre Things I Hearted this Week, 2nd Feb 2018
Texte January 2018 finds itself in the rear view mirror, which probably means I can’t wish Happy New Year to anyone I haven’t spoken to since December. But if I haven’t spoken to someone for that long, I do begin to question why I even bother speaking to them at all… One thing I don’t ever stop to question though is what’s going on in the world of security, so let’s take a look back over the most newsworthy items to come across my virtual desk. Password manager vulnerabilities You may remember a few weeks ago where Freedom to Tinker published findings about two scripts that exploit browsers built-in login managers to retrieve and exfiltrate ID’s. The most commonly-asked question on the back of that was “which password managers should I use?”. Luckily, my friend Adrian Sanabria has done the legwork for you and compiled a list of password managers across different browsers and whether they leak credentials or not. Password Manager Vulnerability Silently Giving Up Credentials | Threatcare The follower factory A very well researched and presented piece by the NYTimes on the business of buying fake followers, what it means to those that buy it, the companies which broker fake identities, and the impact to social media platforms. The follower factory | NYTimes Somewhat related Here’s why the epidemic of malicious ads grew so much worse last year | ars technica Who will pay for Spectre? Probably you What do Toblerone and Brexit have in common with Spectre? A whole lot more than you may think. Who will pay for Spectre? Probably you | Owen Rogers, Medium GDPR Even my spellcheck knows not to question me whenever I type GDPR these days. But that’s not to say it isn’t a topic which generates good discussion. Two pieces that recently caught my eye were: Things to consider before publishing an article about GDPR | Rowenna Fielding / LinkedIn Data Protection, Security, and the GDPR: A fuzzy and fraught relationship | Infospectives The great crypto-currency rush Whether you believe that cryptocurrencies are a bubble, or the next big thing in online payments, there is no denying that it is a hot commodity at the moment. So much so, that criminals are putting a lot of effort into trying to illegally gain a slice of the crypto-pie. The attacks come from a variety of angles. A criminal was able to steal about $150,000 by tricking Experty users into sending their
Envoyé Oui
Condensat $150 $532 'crime 'snooper's “…a “which 000 2014 2018 2nd 60m able about accidentally across act activity address adrian ads advocates ago all all… allowed along also angles another anyone appeal are ars article asked attacks back based basic beef been before begin behavioral behavioural believe biases big bigger billion bitcoin blow bother breached brexit brian broadly broker browsers bubble built business but buy buying call campaigners can’t capabilities caught charter' choices coincheck collect come coming commodity common commonly companies compensation compiled complexities concern consequences consider coo coos corporations court creating credentials crime criminal criminals crunch crypto cryptocurrencies cryptocurrency currency cybersecurity data days december decent decisions denying desk devices different discussion does don’t done dripa economist economists effort employees environment epidemic even ever every exactly exchange exercise exfiltrate exhibit experty exploit eye factory fake far feb feel fielding fighting findings finds first fitness fixed follower followers forced four fraudulent fraught freedom friend from fuzzy gain gdpr gdpr: generates giving gmail going good government’s governments great grew guidelines gunpoint hackers handy happy harvest' harvested has have haven’t hear hearted heatmap hefty heists help here’s hot how id’s identities illegally illustrates impact incentives independent infospectives internet investigatory iot isn’t it’s items its itself january journey judges just keep keeps kinds knows krebs large largest last law laws leak ledger legal legwork let’s like linkedin list locations login long longer look losing lot luckily make making malicious manager managers mapping mass may mean means media medium metadata methods microsoft military’s mind: mirror moment more most much need needed needs network new newsworthy next nonprofit not npr nytimes occur one online only other over overhaul owen oxfordshire packages password pay payments pdf people people's phone pie piece pieces platforms point posted power powers presented pretty privacy privacy  | probably problem problems programme protection published publishing putting question raiders rather rear reasons recently recognizing records referencing rejoiced related relationship remember researched resorting retention retrieve revealing reveals rogers roughly routes rowenna ruled rules rush said sanabria say scripts second securing security sending sensitive serious set should silently since size slice social soldiers some someone somewhat speaking spectre spellcheck spoken steal steps stole stop strava’s streak stuff successful suffered surveillance take tech technica techsoup than that’s them these thing things think those though threatcare time tinker toblerone tokyo topic trackers trader transfer tricking trying two type uk's understand unintended unlawful unless unlikely use users variety very view virtual vulnerabilities vulnerability wallet week weeks well were: what what’s whenever where whether which who whole why will wired wish world worse year yen your zdnet
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: