www.itsecuritynews.info(Weekly Resume)
Facebook’s fact-checkers train AI to detect “deep fake” videos
#44CON: In a Time of Genuine Threats, Talk Sensibly & Act Efficiently
.KOK08 Files Virus – Remove It and Restore Data
‘Web hackers held my data hostage,’ says Wiltshire police commissioner
1-15 August 2018 Cyber Attacks Timeline
12 New iOS 12 Features That Promise to Enhance Enterprise Device Management
2 Billion Bluetooth Devices are Still Vulnerable to Dangerous BlueBorne Attack After 1 Year
2 Billion Bluetooth Devices Remain Exposed to Airborne Attack Vulnerabilities
2 Billion Bluetooth Devices Still Affected by the Blueborne Vulnerability
20/20 malware vision, (Sun, Sep 16th)
2018-09-14 – Quick post: Emotet infection with Trickbot
40% of Managers Say Boards Should Oversee Cybersecurity, Survey Shows
42 Million Emails And Passwords Uploaded To A Free, Public Hosting Service
8 300 officers join forces to tackle crime from the Western Balkans
8 critical safety tips for safer online banking
A cyberattack could trigger the next financial crisis, new report says
A Decade-Old Attack Can Break the Encryption of Most PCs
A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $600 worth
of equipment
A lil Saturday morning computer programming
A practical guide to testing the security of Amazon Web Services (Part 1: AWS S3)
Adaptiva debuts new Windows endpoint health checks and remediations
Address Bar Spoofing Attacks by Safari Browser
Almost 42 Million E-Mail Usernames and Passwords Found on Kayo
An Overview of the OWASP Security Champions Playbook
Analysis of half-a-billion emails reveals malware-less email attacks are on the rise
Apple Donating $1 Million to American Red Cross as Hurricane Florence Makes Landfall
Apple Has Started Paying Hackers For iPhone Exploits
Apple Releases New iPhone Handsets, New Watch
Apple removes top anti-malware apps from its store for “stealing data”
Apple Shares ‘Shot on iPhone XS’ Video Demoing Slo-mo, 4K, and Time-Lapse Modes
Apple Shares Full Video of ‘Gather Round’ iPhone and Apple Watch Event on YouTube
Apple Shares New Minute-Long Video Highlighting iPhone XS Features [Updated]
Apple Watch Series 4 Now Available for Pre-Order
Apple Watch Series 4 vs. Apple Watch Series 3
Apple, Amazon, Google, others called to testify on consumer privacy protections
Apple’s Online Store Down Ahead of iPhone XS, iPhone XS Max, and Apple Watch Series 4 Pre-Orders
APT10 Targeting Japanese Corporations Using Updated TTPs
Army Futures Command to set up DIU-like innovation lab
Arxan launches advanced protection for client-side web apps
August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat
Aviation & Logistics: Island Hopping – A Growing Threat
Leveraging Segmentation to Secure IoT
Leviathan – Mass Audit Toolkit for Networks and Applications
Lin.Security – Vulnhub CTF Challenge Walkthrough
Listen to the Music of Technology With Integration Engineer Tone Johnson
Lucky Break
LuckyMouse Group is back and using a legitimate certificate to sign Malware
Magecart are coming for you, are you ready?
MageCart Attackers Compromise Cloud Service Firm Feedify
Magecart Back Again as Feedify is Hit
Magecart compromises Feedify to get to hundreds of e-commerce sites
Magecart Threat Group Racks Up More Hack Victims
Major US mobile carriers want to be your password
Malicious Kodi Add-ons Install Windows & Linux Coin Mining Trojans
Malware Delivered Through MHT Files, (Thu, Sep 13th)
Malware-as-a-Service – New Black Rose Lucy Malware Targets Android Devices With a Special Logic for Xiaomi Phones
Mapping Social Networks With Gephi
Mark Zuckerberg Defends Facebook’s Privacy, Security Improvements
Masergy appoints James Parker as CEO
Mastering Container Security: Docker, Kubernetes and More
Microsoft ‘Tests’ Pop Up Warning For Rival Browsers
Microsoft Clears the Air About Fighting CLOUD Act Abuses
Microsoft Is Updating Office Desktop on Windows With New Features for Insiders
Microsoft Office 365 Customers Get Protection Against Malicious Macros
Microsoft Office is more dangerous than you think: Doc deliver 45% of all malware
Microsoft Office is more dangerous than you think: Docs deliver 45% of all malware
Microsoft Office Macros Still No v&RFVƗfW'֖7&6gB&VV6W2WrvFw2&WfWrvF7'Ɩ26v֖67&VV֖7&6gB&VV6W2WrvFw2&WfWrvF&֗6RbFV6VBvW26F&ƗG֖7&6gB&Wg2WvfW&VB6VBG&fP֖7&6gB6WFV&W"F6fVBcgVW&&ƗFW26VFrW&F֖7&6gBFW2Fv&RF3FV67W'B66G0&RFWf6R66W72&VF7FVBF7W'72FW6FF2ƖF6V6&Rg&VB27&V6rGF6&FW2&6r#BRV"fW"זV &R&&VW&6F7F2FB6fƖ6G&bƖ6R7FV6&v7FWFffW"&F67vG&Fp'WW2( 5D5TEVFg&Wv&7B'FBvV"6W'fW"VWG&FFW7Fr6V6Ɨ[email protected]7BFW&6WFW'2gVW&&RF7&72Ff&6B&BGF62ԕ42&VV6W2Gf6'gVW&&ƗFW0ՒDSW&^( 2rFfW'6G67G&VwFV7&W'6V7W&G( BBWfV0&V626v7'66&vW26V"6v66V7W&G6VV7FVBFFW25$U$7FFb&w&