Guidelines for Managing the Security of Mobile Devices in the Enterprise: NIST Publishes SP 800-124 Revision 2
How Addictive Tech Hacks Your Brain

Here’s a situation most of us can relate to: We find ourselves facing a dull moment—maybe standing in a checkout line, sitting in a waiting room, or even stuck at a red light—and our hands suddenly feel empty. Like they have a mind of their own, they reach for our pockets, and place a screen in front of our faces.…
Meet Juan Guarnizo, One of Latin America’s Biggest Twitch Stars

You can almost always find Twitch streamer Juan Guarnizo in a crowd by listening for his very loud and unique laugh, beloved by his fans. If you’re at the Cupra Arena stadium in Barcelona, though, you’ll see Guarnizo first. He’ll be the one decked out in red to represent Aniquiladores FC, one of the 12 teams in the…
5 useful search engines for internet‑connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that
Critical fixed critical flaws in Cisco Small Business Switches
Cisco fixed nine flaws in its Small Business Series Switches that could be exploited to execute arbitrary code or cause a DoS condition. Cisco has released security updates to address nine security vulnerabilities in the web-based user interface of certain Small Business Series Switches that could be exploited by an unauthenticated, remote attacker to execute […]
The post Critical fixed critical flaws in Cisco Small Business Switches appeared first on Security Affairs.
How to Reduce Exposure on the Manufacturing Attack Surface
Five Years of the EU General Data Protection Regulation and Data Protection Act 2018
For many outside the data privacy and IT governance, risk management and compliance sectors, the GDPR (General Data Protection Regulation) seemed to appear five years ago as if from nowhere. It had barely made the news before May 2018, but in the weeks running up to its effective date of 25 May 2018 it gained the sort of media coverage and popular interest that most aspirant celebrities can only yearn for. (Indeed, the European Commission proudly shared in a since-deleted infographic that ‘GDPR’ was googled more often than Beyoncé or Kim Kardashian.) The Regulation’s time in the media spotlight didn’t
The post Five Years of the EU General Data Protection Regulation and Data Protection Act 2018 appeared first on IT Governance UK Blog.
Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks
“From malicious emails and URLs to malware, the strain between China’s claim of Taiwan as part of its territory and Taiwan’s maintained independence has evolved into a worrying surge in attacks,” the Trellix Advanced Research Center said
8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency
The flaw in question is CVE-2017-3506 (CVSS score: 7.4), which, when successfully exploited, could allow an unauthenticated attacker to execute arbitrary commands