El Diario del CISO (The CISO Journal) Edición 17 | Page 7
Chinese Researchers Find Vulnerabilities in BMW Cars
Email Leakage - An Overlooked Backdoor to GDPR Failure
Europol Signs Cybersecurity Agreement With EU Agencies, WEF
Fitting Forward Secrecy into Today's Security Architecture
Ahead of GDPR, Information Governance Comes into Its Own
Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate
Amazon Comes Under Fire for Facial Recognition Platform
Attackers Cashing In On Cryptocurrency With Increased Scams
Comcast Patches Router Bug That Leaked Some Wi-Fi Passwords
Intel Responds to News of Spectre-Like Flaw In CPUs
Intel's 'Virtual Fences' Spectre Fix Won't Protect Against Variant 4
James Comey: FBI Faces Deep Tech-Related Questions
Malicious PHP Script Infects 2,400 Websites in the Past Week
Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks,
Researchers Claim Top 6 Mistakes That Will Blow Your Online Cover
Two Vulnerabilities Patched in BIND DNS Software
U.S. Disrupts Russian Botnet of 500,000 Hacked Routers
UK Warns That Aggressive Cyberattack Could Trigger Kinetic Response
Pet Trackers Open to MITM Attacks, Interception
Researchers Say More Spectre-Related CPU Flaws On Horizon
Roaming Mantis Swarms Globally, Spawning iOS Phishing, Cryptomining
Schneider Electric Patches XML Vulnerability In Software
Six Vulnerabilities Found in Dell EMC's Disaster Recovery System, One Critical
TeenSafe Tracking App Exposes Thousands of Private Records
VPNFilter Malware Infects 500k Routers Including Linksys, MikroTik, NETGEAR
What Will GDPR's Impact Be On U.S. Consumer Privacy?
Wicked Botnet Uses Passel of Exploits to Target IoT
5 top trends in endpoint security for 2018 Is Machine Learning Part of Your Security Strategy?
Cato Networks adds threat hunting to its SD-WAN services Realizing the Full Potential of Secure SD-WAN
Chinese citizen tries to steal advanced robotic technology IP
Cybercriminals impersonate popular file sharing services to take over email
accounts Review: Gazing through a hacker’s lens with RiskIQ Digital Footprint
Data is the new air Symantec in a position to progress and prosper
End-to-end security requires multi-vendor automation The 5 best malware metrics you can generate
FBI 'Going Dark' whopper: Locked out of only 1,200 phones, not 7,775 The impact of human behavior on security
FCC urged to investigate ID theft in fake net neutrality comments Understanding Configuration Drift in the Cloud
How to turn cyber babble into a language we all speak What is cryptojacking? How to prevent, detect, and recover from it
IP theft doesn’t always come from overseas
2,500 students, alumni and staffers affected by University at Buffalo data
breach
3.2 million LA County 211 records exposed on misconfigured AWS S3 bucket
Allied Physicians hit with SamSam ransomware Luxury hackers crack Bimmers and Benzes, a tale of BMW's bugs and
Mercedes-Benz thugs
Mirai-variant attack launched from Mexico
Pen testers break down bank security flaws
Scapegoating security researchers harms society