El Diario del CISO (The CISO Journal) Edición 17 | Page 7

Chinese Researchers Find Vulnerabilities in BMW Cars Email Leakage - An Overlooked Backdoor to GDPR Failure Europol Signs Cybersecurity Agreement With EU Agencies, WEF Fitting Forward Secrecy into Today's Security Architecture Ahead of GDPR, Information Governance Comes into Its Own Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate Amazon Comes Under Fire for Facial Recognition Platform Attackers Cashing In On Cryptocurrency With Increased Scams Comcast Patches Router Bug That Leaked Some Wi-Fi Passwords Intel Responds to News of Spectre-Like Flaw In CPUs Intel's 'Virtual Fences' Spectre Fix Won't Protect Against Variant 4 James Comey: FBI Faces Deep Tech-Related Questions Malicious PHP Script Infects 2,400 Websites in the Past Week Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks, Researchers Claim Top 6 Mistakes That Will Blow Your Online Cover Two Vulnerabilities Patched in BIND DNS Software U.S. Disrupts Russian Botnet of 500,000 Hacked Routers UK Warns That Aggressive Cyberattack Could Trigger Kinetic Response Pet Trackers Open to MITM Attacks, Interception Researchers Say More Spectre-Related CPU Flaws On Horizon Roaming Mantis Swarms Globally, Spawning iOS Phishing, Cryptomining Schneider Electric Patches XML Vulnerability In Software Six Vulnerabilities Found in Dell EMC's Disaster Recovery System, One Critical TeenSafe Tracking App Exposes Thousands of Private Records VPNFilter Malware Infects 500k Routers Including Linksys, MikroTik, NETGEAR What Will GDPR's Impact Be On U.S. Consumer Privacy? Wicked Botnet Uses Passel of Exploits to Target IoT 5 top trends in endpoint security for 2018 Is Machine Learning Part of Your Security Strategy? Cato Networks adds threat hunting to its SD-WAN services Realizing the Full Potential of Secure SD-WAN Chinese citizen tries to steal advanced robotic technology IP Cybercriminals impersonate popular file sharing services to take over email accounts Review: Gazing through a hacker’s lens with RiskIQ Digital Footprint Data is the new air Symantec in a position to progress and prosper End-to-end security requires multi-vendor automation The 5 best malware metrics you can generate FBI 'Going Dark' whopper: Locked out of only 1,200 phones, not 7,775 The impact of human behavior on security FCC urged to investigate ID theft in fake net neutrality comments Understanding Configuration Drift in the Cloud How to turn cyber babble into a language we all speak What is cryptojacking? How to prevent, detect, and recover from it IP theft doesn’t always come from overseas 2,500 students, alumni and staffers affected by University at Buffalo data breach 3.2 million LA County 211 records exposed on misconfigured AWS S3 bucket Allied Physicians hit with SamSam ransomware Luxury hackers crack Bimmers and Benzes, a tale of BMW's bugs and Mercedes-Benz thugs Mirai-variant attack launched from Mexico Pen testers break down bank security flaws Scapegoating security researchers harms society